Feb 9 18:55:09.141900 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 18:55:09.141956 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 18:55:09.141970 kernel: BIOS-provided physical RAM map: Feb 9 18:55:09.141981 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 9 18:55:09.141990 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 9 18:55:09.141999 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 9 18:55:09.142145 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Feb 9 18:55:09.142158 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Feb 9 18:55:09.142168 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Feb 9 18:55:09.142178 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 9 18:55:09.142307 kernel: NX (Execute Disable) protection: active Feb 9 18:55:09.142319 kernel: SMBIOS 2.7 present. Feb 9 18:55:09.142330 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Feb 9 18:55:09.142351 kernel: Hypervisor detected: KVM Feb 9 18:55:09.142368 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 18:55:09.142379 kernel: kvm-clock: cpu 0, msr 3efaa001, primary cpu clock Feb 9 18:55:09.142390 kernel: kvm-clock: using sched offset of 7329809221 cycles Feb 9 18:55:09.142403 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 18:55:09.142415 kernel: tsc: Detected 2499.994 MHz processor Feb 9 18:55:09.142426 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 18:55:09.142441 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 18:55:09.142452 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Feb 9 18:55:09.142464 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 18:55:09.142476 kernel: Using GB pages for direct mapping Feb 9 18:55:09.142488 kernel: ACPI: Early table checksum verification disabled Feb 9 18:55:09.142499 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Feb 9 18:55:09.142509 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Feb 9 18:55:09.142521 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 9 18:55:09.142532 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Feb 9 18:55:09.142546 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Feb 9 18:55:09.142556 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 9 18:55:09.142567 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 9 18:55:09.142579 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Feb 9 18:55:09.142590 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 9 18:55:09.142601 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Feb 9 18:55:09.142612 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Feb 9 18:55:09.142623 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 9 18:55:09.142637 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Feb 9 18:55:09.142648 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Feb 9 18:55:09.142659 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Feb 9 18:55:09.142676 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Feb 9 18:55:09.142688 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Feb 9 18:55:09.142701 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Feb 9 18:55:09.142713 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Feb 9 18:55:09.142728 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Feb 9 18:55:09.142740 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Feb 9 18:55:09.142751 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Feb 9 18:55:09.142763 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 18:55:09.142775 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 18:55:09.142788 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Feb 9 18:55:09.142799 kernel: NUMA: Initialized distance table, cnt=1 Feb 9 18:55:09.142811 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Feb 9 18:55:09.142825 kernel: Zone ranges: Feb 9 18:55:09.142838 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 18:55:09.142850 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Feb 9 18:55:09.142862 kernel: Normal empty Feb 9 18:55:09.142873 kernel: Movable zone start for each node Feb 9 18:55:09.142885 kernel: Early memory node ranges Feb 9 18:55:09.142898 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 9 18:55:09.142910 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Feb 9 18:55:09.142922 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Feb 9 18:55:09.142936 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 18:55:09.142948 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 9 18:55:09.142961 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Feb 9 18:55:09.142973 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 18:55:09.142985 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 18:55:09.142997 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Feb 9 18:55:09.143009 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 18:55:09.143021 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 18:55:09.143034 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 18:55:09.143048 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 18:55:09.143060 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 18:55:09.143071 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 18:55:09.143083 kernel: TSC deadline timer available Feb 9 18:55:09.143096 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 18:55:09.143108 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Feb 9 18:55:09.143120 kernel: Booting paravirtualized kernel on KVM Feb 9 18:55:09.143132 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 18:55:09.143145 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 18:55:09.143160 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 18:55:09.143172 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 18:55:09.143183 kernel: pcpu-alloc: [0] 0 1 Feb 9 18:55:09.143194 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Feb 9 18:55:09.143207 kernel: kvm-guest: PV spinlocks enabled Feb 9 18:55:09.143219 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 18:55:09.143231 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Feb 9 18:55:09.143243 kernel: Policy zone: DMA32 Feb 9 18:55:09.143256 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 18:55:09.143271 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 18:55:09.143283 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 18:55:09.143295 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 18:55:09.143308 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 18:55:09.143321 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved) Feb 9 18:55:09.143333 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 18:55:09.143353 kernel: Kernel/User page tables isolation: enabled Feb 9 18:55:09.143365 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 18:55:09.143380 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 18:55:09.143392 kernel: rcu: Hierarchical RCU implementation. Feb 9 18:55:09.143405 kernel: rcu: RCU event tracing is enabled. Feb 9 18:55:09.143418 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 18:55:09.143430 kernel: Rude variant of Tasks RCU enabled. Feb 9 18:55:09.143442 kernel: Tracing variant of Tasks RCU enabled. Feb 9 18:55:09.143454 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 18:55:09.143466 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 18:55:09.143479 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 18:55:09.143493 kernel: random: crng init done Feb 9 18:55:09.143504 kernel: Console: colour VGA+ 80x25 Feb 9 18:55:09.143517 kernel: printk: console [ttyS0] enabled Feb 9 18:55:09.143529 kernel: ACPI: Core revision 20210730 Feb 9 18:55:09.143541 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Feb 9 18:55:09.143615 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 18:55:09.143629 kernel: x2apic enabled Feb 9 18:55:09.143642 kernel: Switched APIC routing to physical x2apic. Feb 9 18:55:09.143654 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns Feb 9 18:55:09.143670 kernel: Calibrating delay loop (skipped) preset value.. 4999.98 BogoMIPS (lpj=2499994) Feb 9 18:55:09.143683 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 18:55:09.143696 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 18:55:09.143709 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 18:55:09.143730 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 18:55:09.143745 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 18:55:09.143758 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 18:55:09.143771 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 9 18:55:09.143784 kernel: RETBleed: Vulnerable Feb 9 18:55:09.143797 kernel: Speculative Store Bypass: Vulnerable Feb 9 18:55:09.143808 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 18:55:09.143821 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 18:55:09.143834 kernel: GDS: Unknown: Dependent on hypervisor status Feb 9 18:55:09.143847 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 18:55:09.143862 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 18:55:09.143875 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 18:55:09.143887 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 18:55:09.143899 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 18:55:09.143912 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 9 18:55:09.143927 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 9 18:55:09.143940 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 9 18:55:09.143953 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Feb 9 18:55:09.143966 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 18:55:09.143980 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 18:55:09.143994 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 18:55:09.144007 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Feb 9 18:55:09.144018 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Feb 9 18:55:09.144031 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Feb 9 18:55:09.144044 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Feb 9 18:55:09.144056 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Feb 9 18:55:09.144068 kernel: Freeing SMP alternatives memory: 32K Feb 9 18:55:09.144084 kernel: pid_max: default: 32768 minimum: 301 Feb 9 18:55:09.144096 kernel: LSM: Security Framework initializing Feb 9 18:55:09.144109 kernel: SELinux: Initializing. Feb 9 18:55:09.144122 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 18:55:09.144136 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 18:55:09.144149 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 9 18:55:09.144163 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 9 18:55:09.144176 kernel: signal: max sigframe size: 3632 Feb 9 18:55:09.144189 kernel: rcu: Hierarchical SRCU implementation. Feb 9 18:55:09.144202 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 18:55:09.144217 kernel: smp: Bringing up secondary CPUs ... Feb 9 18:55:09.144230 kernel: x86: Booting SMP configuration: Feb 9 18:55:09.144243 kernel: .... node #0, CPUs: #1 Feb 9 18:55:09.144256 kernel: kvm-clock: cpu 1, msr 3efaa041, secondary cpu clock Feb 9 18:55:09.144269 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Feb 9 18:55:09.144283 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 9 18:55:09.144296 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 18:55:09.144308 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 18:55:09.144321 kernel: smpboot: Max logical packages: 1 Feb 9 18:55:09.144336 kernel: smpboot: Total of 2 processors activated (9999.97 BogoMIPS) Feb 9 18:55:09.159701 kernel: devtmpfs: initialized Feb 9 18:55:09.159718 kernel: x86/mm: Memory block size: 128MB Feb 9 18:55:09.159733 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 18:55:09.159748 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 18:55:09.159761 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 18:55:09.159775 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 18:55:09.159789 kernel: audit: initializing netlink subsys (disabled) Feb 9 18:55:09.159802 kernel: audit: type=2000 audit(1707504907.874:1): state=initialized audit_enabled=0 res=1 Feb 9 18:55:09.159822 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 18:55:09.159836 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 18:55:09.159850 kernel: cpuidle: using governor menu Feb 9 18:55:09.159863 kernel: ACPI: bus type PCI registered Feb 9 18:55:09.159877 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 18:55:09.159891 kernel: dca service started, version 1.12.1 Feb 9 18:55:09.159904 kernel: PCI: Using configuration type 1 for base access Feb 9 18:55:09.159918 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 18:55:09.159931 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 18:55:09.159947 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 18:55:09.159960 kernel: ACPI: Added _OSI(Module Device) Feb 9 18:55:09.159973 kernel: ACPI: Added _OSI(Processor Device) Feb 9 18:55:09.159986 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 18:55:09.160000 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 18:55:09.160014 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 18:55:09.160028 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 18:55:09.160041 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 18:55:09.160055 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 9 18:55:09.160072 kernel: ACPI: Interpreter enabled Feb 9 18:55:09.160085 kernel: ACPI: PM: (supports S0 S5) Feb 9 18:55:09.160098 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 18:55:09.160112 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 18:55:09.160125 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 9 18:55:09.160138 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 18:55:09.160375 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 18:55:09.160507 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 18:55:09.160528 kernel: acpiphp: Slot [3] registered Feb 9 18:55:09.160542 kernel: acpiphp: Slot [4] registered Feb 9 18:55:09.160555 kernel: acpiphp: Slot [5] registered Feb 9 18:55:09.160567 kernel: acpiphp: Slot [6] registered Feb 9 18:55:09.160580 kernel: acpiphp: Slot [7] registered Feb 9 18:55:09.160592 kernel: acpiphp: Slot [8] registered Feb 9 18:55:09.160606 kernel: acpiphp: Slot [9] registered Feb 9 18:55:09.160619 kernel: acpiphp: Slot [10] registered Feb 9 18:55:09.160632 kernel: acpiphp: Slot [11] registered Feb 9 18:55:09.160648 kernel: acpiphp: Slot [12] registered Feb 9 18:55:09.160661 kernel: acpiphp: Slot [13] registered Feb 9 18:55:09.160674 kernel: acpiphp: Slot [14] registered Feb 9 18:55:09.160686 kernel: acpiphp: Slot [15] registered Feb 9 18:55:09.160699 kernel: acpiphp: Slot [16] registered Feb 9 18:55:09.160712 kernel: acpiphp: Slot [17] registered Feb 9 18:55:09.160725 kernel: acpiphp: Slot [18] registered Feb 9 18:55:09.160738 kernel: acpiphp: Slot [19] registered Feb 9 18:55:09.160752 kernel: acpiphp: Slot [20] registered Feb 9 18:55:09.160767 kernel: acpiphp: Slot [21] registered Feb 9 18:55:09.160780 kernel: acpiphp: Slot [22] registered Feb 9 18:55:09.160793 kernel: acpiphp: Slot [23] registered Feb 9 18:55:09.160806 kernel: acpiphp: Slot [24] registered Feb 9 18:55:09.160818 kernel: acpiphp: Slot [25] registered Feb 9 18:55:09.160831 kernel: acpiphp: Slot [26] registered Feb 9 18:55:09.160844 kernel: acpiphp: Slot [27] registered Feb 9 18:55:09.160857 kernel: acpiphp: Slot [28] registered Feb 9 18:55:09.160870 kernel: acpiphp: Slot [29] registered Feb 9 18:55:09.160883 kernel: acpiphp: Slot [30] registered Feb 9 18:55:09.160898 kernel: acpiphp: Slot [31] registered Feb 9 18:55:09.160911 kernel: PCI host bridge to bus 0000:00 Feb 9 18:55:09.161038 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 18:55:09.161148 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 18:55:09.161256 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 18:55:09.161378 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 9 18:55:09.161480 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 18:55:09.161612 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 18:55:09.161738 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 18:55:09.161863 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Feb 9 18:55:09.162021 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 18:55:09.162142 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 9 18:55:09.162260 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Feb 9 18:55:09.162386 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Feb 9 18:55:09.162505 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Feb 9 18:55:09.162623 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Feb 9 18:55:09.162736 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Feb 9 18:55:09.162851 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Feb 9 18:55:09.162975 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Feb 9 18:55:09.163094 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Feb 9 18:55:09.163207 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 9 18:55:09.163325 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 18:55:09.163458 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 9 18:55:09.163686 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Feb 9 18:55:09.163818 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 9 18:55:09.163937 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Feb 9 18:55:09.163954 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 18:55:09.163972 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 18:55:09.163986 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 18:55:09.164000 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 18:55:09.164013 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 18:55:09.164027 kernel: iommu: Default domain type: Translated Feb 9 18:55:09.164040 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 18:55:09.164156 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Feb 9 18:55:09.164271 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 18:55:09.174957 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Feb 9 18:55:09.175005 kernel: vgaarb: loaded Feb 9 18:55:09.175019 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 18:55:09.175033 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 18:55:09.175046 kernel: PTP clock support registered Feb 9 18:55:09.175058 kernel: PCI: Using ACPI for IRQ routing Feb 9 18:55:09.175071 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 18:55:09.175085 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 9 18:55:09.175099 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Feb 9 18:55:09.175115 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 18:55:09.175128 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Feb 9 18:55:09.175142 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 18:55:09.175155 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 18:55:09.175168 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 18:55:09.175181 kernel: pnp: PnP ACPI init Feb 9 18:55:09.175194 kernel: pnp: PnP ACPI: found 5 devices Feb 9 18:55:09.175207 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 18:55:09.175219 kernel: NET: Registered PF_INET protocol family Feb 9 18:55:09.175235 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 18:55:09.175248 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 9 18:55:09.175261 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 18:55:09.175274 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 18:55:09.175287 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 18:55:09.175300 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 9 18:55:09.175314 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 18:55:09.175327 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 18:55:09.175349 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 18:55:09.175365 kernel: NET: Registered PF_XDP protocol family Feb 9 18:55:09.175486 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 18:55:09.175686 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 18:55:09.175841 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 18:55:09.176022 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 9 18:55:09.176248 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 18:55:09.176457 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 18:55:09.176516 kernel: PCI: CLS 0 bytes, default 64 Feb 9 18:55:09.176532 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 18:55:09.176547 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns Feb 9 18:55:09.176592 kernel: clocksource: Switched to clocksource tsc Feb 9 18:55:09.176608 kernel: Initialise system trusted keyrings Feb 9 18:55:09.176623 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 9 18:55:09.176637 kernel: Key type asymmetric registered Feb 9 18:55:09.176741 kernel: Asymmetric key parser 'x509' registered Feb 9 18:55:09.176792 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 18:55:09.176811 kernel: io scheduler mq-deadline registered Feb 9 18:55:09.176824 kernel: io scheduler kyber registered Feb 9 18:55:09.176837 kernel: io scheduler bfq registered Feb 9 18:55:09.176851 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 18:55:09.176864 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 18:55:09.176878 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 18:55:09.176892 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 18:55:09.176905 kernel: i8042: Warning: Keylock active Feb 9 18:55:09.176918 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 18:55:09.176934 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 18:55:09.177086 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 9 18:55:09.177202 kernel: rtc_cmos 00:00: registered as rtc0 Feb 9 18:55:09.177322 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T18:55:08 UTC (1707504908) Feb 9 18:55:09.177444 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 9 18:55:09.177461 kernel: intel_pstate: CPU model not supported Feb 9 18:55:09.177475 kernel: NET: Registered PF_INET6 protocol family Feb 9 18:55:09.177488 kernel: Segment Routing with IPv6 Feb 9 18:55:09.177505 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 18:55:09.177518 kernel: NET: Registered PF_PACKET protocol family Feb 9 18:55:09.177531 kernel: Key type dns_resolver registered Feb 9 18:55:09.177545 kernel: IPI shorthand broadcast: enabled Feb 9 18:55:09.177559 kernel: sched_clock: Marking stable (478674915, 320823356)->(993970789, -194472518) Feb 9 18:55:09.177573 kernel: registered taskstats version 1 Feb 9 18:55:09.177586 kernel: Loading compiled-in X.509 certificates Feb 9 18:55:09.177600 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 18:55:09.177614 kernel: Key type .fscrypt registered Feb 9 18:55:09.177629 kernel: Key type fscrypt-provisioning registered Feb 9 18:55:09.177643 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 18:55:09.177657 kernel: ima: Allocated hash algorithm: sha1 Feb 9 18:55:09.177670 kernel: ima: No architecture policies found Feb 9 18:55:09.177683 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 18:55:09.177696 kernel: Write protecting the kernel read-only data: 28672k Feb 9 18:55:09.177710 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 18:55:09.177723 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 18:55:09.177737 kernel: Run /init as init process Feb 9 18:55:09.177752 kernel: with arguments: Feb 9 18:55:09.177766 kernel: /init Feb 9 18:55:09.177780 kernel: with environment: Feb 9 18:55:09.177793 kernel: HOME=/ Feb 9 18:55:09.177806 kernel: TERM=linux Feb 9 18:55:09.177819 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 18:55:09.177836 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:55:09.177853 systemd[1]: Detected virtualization amazon. Feb 9 18:55:09.177870 systemd[1]: Detected architecture x86-64. Feb 9 18:55:09.177883 systemd[1]: Running in initrd. Feb 9 18:55:09.177897 systemd[1]: No hostname configured, using default hostname. Feb 9 18:55:09.177911 systemd[1]: Hostname set to . Feb 9 18:55:09.177977 systemd[1]: Initializing machine ID from VM UUID. Feb 9 18:55:09.177995 systemd[1]: Queued start job for default target initrd.target. Feb 9 18:55:09.178009 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:55:09.178023 systemd[1]: Reached target cryptsetup.target. Feb 9 18:55:09.178037 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 18:55:09.178051 systemd[1]: Reached target paths.target. Feb 9 18:55:09.178065 systemd[1]: Reached target slices.target. Feb 9 18:55:09.178079 systemd[1]: Reached target swap.target. Feb 9 18:55:09.178092 systemd[1]: Reached target timers.target. Feb 9 18:55:09.178110 systemd[1]: Listening on iscsid.socket. Feb 9 18:55:09.178124 systemd[1]: Listening on iscsiuio.socket. Feb 9 18:55:09.178138 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 18:55:09.178153 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 18:55:09.178167 systemd[1]: Listening on systemd-journald.socket. Feb 9 18:55:09.178181 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:55:09.178195 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:55:09.178209 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:55:09.178223 systemd[1]: Reached target sockets.target. Feb 9 18:55:09.178239 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:55:09.178256 systemd[1]: Finished network-cleanup.service. Feb 9 18:55:09.178270 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 18:55:09.178284 systemd[1]: Starting systemd-journald.service... Feb 9 18:55:09.178298 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:55:09.178312 systemd[1]: Starting systemd-resolved.service... Feb 9 18:55:09.178326 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 18:55:09.183377 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:55:09.183416 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 18:55:09.183443 systemd-journald[185]: Journal started Feb 9 18:55:09.183531 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2823c62fd1d4ebc486ab9dcea05f0f) is 4.8M, max 38.7M, 33.9M free. Feb 9 18:55:09.144387 systemd-modules-load[186]: Inserted module 'overlay' Feb 9 18:55:09.259192 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 18:55:09.259226 kernel: Bridge firewalling registered Feb 9 18:55:09.259246 systemd[1]: Started systemd-journald.service. Feb 9 18:55:09.259270 kernel: audit: type=1130 audit(1707504909.248:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.259289 kernel: SCSI subsystem initialized Feb 9 18:55:09.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.204499 systemd-resolved[187]: Positive Trust Anchors: Feb 9 18:55:09.266057 kernel: audit: type=1130 audit(1707504909.257:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.204516 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:55:09.204567 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:55:09.209522 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 9 18:55:09.220476 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 9 18:55:09.259854 systemd[1]: Started systemd-resolved.service. Feb 9 18:55:09.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.286063 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 18:55:09.307956 kernel: audit: type=1130 audit(1707504909.285:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.308020 kernel: audit: type=1130 audit(1707504909.294:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.308051 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 18:55:09.308074 kernel: device-mapper: uevent: version 1.0.3 Feb 9 18:55:09.308133 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 18:55:09.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.294833 systemd[1]: Reached target nss-lookup.target. Feb 9 18:55:09.304856 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 18:55:09.314940 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:55:09.327122 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 9 18:55:09.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.342812 kernel: audit: type=1130 audit(1707504909.327:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.328600 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:55:09.328931 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:55:09.335993 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:55:09.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.360529 kernel: audit: type=1130 audit(1707504909.327:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.366697 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:55:09.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.372358 kernel: audit: type=1130 audit(1707504909.366:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.379823 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 18:55:09.382304 systemd[1]: Starting dracut-cmdline.service... Feb 9 18:55:09.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.391145 kernel: audit: type=1130 audit(1707504909.380:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.393673 dracut-cmdline[207]: dracut-dracut-053 Feb 9 18:55:09.396142 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 18:55:09.485374 kernel: Loading iSCSI transport class v2.0-870. Feb 9 18:55:09.500552 kernel: iscsi: registered transport (tcp) Feb 9 18:55:09.530011 kernel: iscsi: registered transport (qla4xxx) Feb 9 18:55:09.530086 kernel: QLogic iSCSI HBA Driver Feb 9 18:55:09.568872 systemd[1]: Finished dracut-cmdline.service. Feb 9 18:55:09.577366 kernel: audit: type=1130 audit(1707504909.570:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:09.571633 systemd[1]: Starting dracut-pre-udev.service... Feb 9 18:55:09.633398 kernel: raid6: avx512x4 gen() 15506 MB/s Feb 9 18:55:09.650393 kernel: raid6: avx512x4 xor() 6848 MB/s Feb 9 18:55:09.667384 kernel: raid6: avx512x2 gen() 16223 MB/s Feb 9 18:55:09.684391 kernel: raid6: avx512x2 xor() 18560 MB/s Feb 9 18:55:09.701398 kernel: raid6: avx512x1 gen() 14220 MB/s Feb 9 18:55:09.719384 kernel: raid6: avx512x1 xor() 14268 MB/s Feb 9 18:55:09.737398 kernel: raid6: avx2x4 gen() 13451 MB/s Feb 9 18:55:09.754392 kernel: raid6: avx2x4 xor() 6531 MB/s Feb 9 18:55:09.771395 kernel: raid6: avx2x2 gen() 15543 MB/s Feb 9 18:55:09.788383 kernel: raid6: avx2x2 xor() 16140 MB/s Feb 9 18:55:09.805394 kernel: raid6: avx2x1 gen() 12099 MB/s Feb 9 18:55:09.823393 kernel: raid6: avx2x1 xor() 14002 MB/s Feb 9 18:55:09.840425 kernel: raid6: sse2x4 gen() 8625 MB/s Feb 9 18:55:09.860439 kernel: raid6: sse2x4 xor() 2180 MB/s Feb 9 18:55:09.880377 kernel: raid6: sse2x2 gen() 5269 MB/s Feb 9 18:55:09.897389 kernel: raid6: sse2x2 xor() 2510 MB/s Feb 9 18:55:09.916315 kernel: raid6: sse2x1 gen() 5219 MB/s Feb 9 18:55:09.933752 kernel: raid6: sse2x1 xor() 2180 MB/s Feb 9 18:55:09.933831 kernel: raid6: using algorithm avx512x2 gen() 16223 MB/s Feb 9 18:55:09.933851 kernel: raid6: .... xor() 18560 MB/s, rmw enabled Feb 9 18:55:09.934759 kernel: raid6: using avx512x2 recovery algorithm Feb 9 18:55:09.952374 kernel: xor: automatically using best checksumming function avx Feb 9 18:55:10.079379 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 18:55:10.088237 systemd[1]: Finished dracut-pre-udev.service. Feb 9 18:55:10.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:10.090000 audit: BPF prog-id=7 op=LOAD Feb 9 18:55:10.090000 audit: BPF prog-id=8 op=LOAD Feb 9 18:55:10.091180 systemd[1]: Starting systemd-udevd.service... Feb 9 18:55:10.106458 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 9 18:55:10.112216 systemd[1]: Started systemd-udevd.service. Feb 9 18:55:10.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:10.114675 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 18:55:10.147565 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation Feb 9 18:55:10.192753 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 18:55:10.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:10.195668 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:55:10.260960 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:55:10.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:10.355372 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 9 18:55:10.355685 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 9 18:55:10.355831 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 18:55:10.366362 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Feb 9 18:55:10.376393 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:d4:ce:91:24:05 Feb 9 18:55:10.378412 (udev-worker)[437]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:55:10.549336 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 9 18:55:10.549590 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 9 18:55:10.549610 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 9 18:55:10.549747 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 18:55:10.549773 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 18:55:10.549792 kernel: GPT:9289727 != 16777215 Feb 9 18:55:10.549809 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 18:55:10.549827 kernel: GPT:9289727 != 16777215 Feb 9 18:55:10.549845 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 18:55:10.549868 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 18:55:10.549890 kernel: AES CTR mode by8 optimization enabled Feb 9 18:55:10.549907 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (432) Feb 9 18:55:10.541823 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 18:55:10.581413 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:55:10.595569 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 18:55:10.598771 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 18:55:10.601235 systemd[1]: Starting disk-uuid.service... Feb 9 18:55:10.614435 disk-uuid[572]: Primary Header is updated. Feb 9 18:55:10.614435 disk-uuid[572]: Secondary Entries is updated. Feb 9 18:55:10.614435 disk-uuid[572]: Secondary Header is updated. Feb 9 18:55:10.667175 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 18:55:11.635383 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 18:55:11.636180 disk-uuid[574]: The operation has completed successfully. Feb 9 18:55:11.835218 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 18:55:11.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:11.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:11.835330 systemd[1]: Finished disk-uuid.service. Feb 9 18:55:11.849247 systemd[1]: Starting verity-setup.service... Feb 9 18:55:11.880426 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 18:55:11.972053 systemd[1]: Found device dev-mapper-usr.device. Feb 9 18:55:11.974449 systemd[1]: Mounting sysusr-usr.mount... Feb 9 18:55:11.981272 systemd[1]: Finished verity-setup.service. Feb 9 18:55:11.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:12.091370 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 18:55:12.091553 systemd[1]: Mounted sysusr-usr.mount. Feb 9 18:55:12.093331 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 18:55:12.095976 systemd[1]: Starting ignition-setup.service... Feb 9 18:55:12.097901 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 18:55:12.125459 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 9 18:55:12.125519 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 18:55:12.125532 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 18:55:12.141368 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 18:55:12.162769 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 18:55:12.211617 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 18:55:12.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:12.213000 audit: BPF prog-id=9 op=LOAD Feb 9 18:55:12.214368 systemd[1]: Starting systemd-networkd.service... Feb 9 18:55:12.243210 systemd[1]: Finished ignition-setup.service. Feb 9 18:55:12.246657 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 18:55:12.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:12.254056 systemd-networkd[1100]: lo: Link UP Feb 9 18:55:12.254305 systemd-networkd[1100]: lo: Gained carrier Feb 9 18:55:12.255037 systemd-networkd[1100]: Enumeration completed Feb 9 18:55:12.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:12.255154 systemd[1]: Started systemd-networkd.service. Feb 9 18:55:12.255712 systemd-networkd[1100]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:55:12.258169 systemd[1]: Reached target network.target. Feb 9 18:55:12.261140 systemd[1]: Starting iscsiuio.service... Feb 9 18:55:12.269107 systemd-networkd[1100]: eth0: Link UP Feb 9 18:55:12.269283 systemd[1]: Started iscsiuio.service. Feb 9 18:55:12.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:12.270374 systemd-networkd[1100]: eth0: Gained carrier Feb 9 18:55:12.272137 systemd[1]: Starting iscsid.service... Feb 9 18:55:12.279664 iscsid[1107]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:55:12.279664 iscsid[1107]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 18:55:12.279664 iscsid[1107]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 18:55:12.279664 iscsid[1107]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 18:55:12.279664 iscsid[1107]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:55:12.293391 iscsid[1107]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 18:55:12.285328 systemd[1]: Started iscsid.service. Feb 9 18:55:12.290559 systemd-networkd[1100]: eth0: DHCPv4 address 172.31.20.217/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 18:55:12.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:12.302999 systemd[1]: Starting dracut-initqueue.service... Feb 9 18:55:12.319973 systemd[1]: Finished dracut-initqueue.service. Feb 9 18:55:12.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:12.322611 systemd[1]: Reached target remote-fs-pre.target. Feb 9 18:55:12.325281 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:55:12.327120 systemd[1]: Reached target remote-fs.target. Feb 9 18:55:12.333934 systemd[1]: Starting dracut-pre-mount.service... Feb 9 18:55:12.344129 systemd[1]: Finished dracut-pre-mount.service. Feb 9 18:55:12.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.053877 ignition[1102]: Ignition 2.14.0 Feb 9 18:55:13.053891 ignition[1102]: Stage: fetch-offline Feb 9 18:55:13.054046 ignition[1102]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:55:13.054089 ignition[1102]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:55:13.075370 ignition[1102]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:55:13.075946 ignition[1102]: Ignition finished successfully Feb 9 18:55:13.078840 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 18:55:13.081084 systemd[1]: Starting ignition-fetch.service... Feb 9 18:55:13.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.106557 ignition[1126]: Ignition 2.14.0 Feb 9 18:55:13.106571 ignition[1126]: Stage: fetch Feb 9 18:55:13.106818 ignition[1126]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:55:13.106848 ignition[1126]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:55:13.116078 ignition[1126]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:55:13.117709 ignition[1126]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:55:13.130790 ignition[1126]: INFO : PUT result: OK Feb 9 18:55:13.139172 ignition[1126]: DEBUG : parsed url from cmdline: "" Feb 9 18:55:13.139172 ignition[1126]: INFO : no config URL provided Feb 9 18:55:13.139172 ignition[1126]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:55:13.147243 ignition[1126]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 9 18:55:13.147243 ignition[1126]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:55:13.147243 ignition[1126]: INFO : PUT result: OK Feb 9 18:55:13.147243 ignition[1126]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 9 18:55:13.152104 ignition[1126]: INFO : GET result: OK Feb 9 18:55:13.153118 ignition[1126]: DEBUG : parsing config with SHA512: 6b58a1c41c2ff8f1397f5182b79d456f7b2b4090ddb3f16cdeb83e40a8003dc44043fb6dc49becfbeffd70a465ccaa70f9ebf386d2ce7e8f6c734ddeb544e67f Feb 9 18:55:13.176211 unknown[1126]: fetched base config from "system" Feb 9 18:55:13.176225 unknown[1126]: fetched base config from "system" Feb 9 18:55:13.176233 unknown[1126]: fetched user config from "aws" Feb 9 18:55:13.180065 ignition[1126]: fetch: fetch complete Feb 9 18:55:13.180118 ignition[1126]: fetch: fetch passed Feb 9 18:55:13.180216 ignition[1126]: Ignition finished successfully Feb 9 18:55:13.184382 systemd[1]: Finished ignition-fetch.service. Feb 9 18:55:13.189408 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 18:55:13.189453 kernel: audit: type=1130 audit(1707504913.185:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.187220 systemd[1]: Starting ignition-kargs.service... Feb 9 18:55:13.207902 ignition[1132]: Ignition 2.14.0 Feb 9 18:55:13.207943 ignition[1132]: Stage: kargs Feb 9 18:55:13.208254 ignition[1132]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:55:13.208323 ignition[1132]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:55:13.220046 ignition[1132]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:55:13.221962 ignition[1132]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:55:13.225239 ignition[1132]: INFO : PUT result: OK Feb 9 18:55:13.229379 ignition[1132]: kargs: kargs passed Feb 9 18:55:13.229532 ignition[1132]: Ignition finished successfully Feb 9 18:55:13.233040 systemd[1]: Finished ignition-kargs.service. Feb 9 18:55:13.240760 kernel: audit: type=1130 audit(1707504913.233:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.235398 systemd[1]: Starting ignition-disks.service... Feb 9 18:55:13.249453 ignition[1138]: Ignition 2.14.0 Feb 9 18:55:13.249470 ignition[1138]: Stage: disks Feb 9 18:55:13.249678 ignition[1138]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:55:13.249710 ignition[1138]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:55:13.263403 ignition[1138]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:55:13.265530 ignition[1138]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:55:13.270054 ignition[1138]: INFO : PUT result: OK Feb 9 18:55:13.273393 ignition[1138]: disks: disks passed Feb 9 18:55:13.273457 ignition[1138]: Ignition finished successfully Feb 9 18:55:13.277311 systemd[1]: Finished ignition-disks.service. Feb 9 18:55:13.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.277564 systemd[1]: Reached target initrd-root-device.target. Feb 9 18:55:13.288044 kernel: audit: type=1130 audit(1707504913.277:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.289895 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:55:13.291043 systemd[1]: Reached target local-fs.target. Feb 9 18:55:13.298334 systemd[1]: Reached target sysinit.target. Feb 9 18:55:13.299480 systemd[1]: Reached target basic.target. Feb 9 18:55:13.304072 systemd[1]: Starting systemd-fsck-root.service... Feb 9 18:55:13.346224 systemd-fsck[1146]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 18:55:13.351998 systemd[1]: Finished systemd-fsck-root.service. Feb 9 18:55:13.358801 kernel: audit: type=1130 audit(1707504913.353:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.359685 systemd[1]: Mounting sysroot.mount... Feb 9 18:55:13.375366 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 18:55:13.376867 systemd[1]: Mounted sysroot.mount. Feb 9 18:55:13.379045 systemd[1]: Reached target initrd-root-fs.target. Feb 9 18:55:13.393449 systemd[1]: Mounting sysroot-usr.mount... Feb 9 18:55:13.397626 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 18:55:13.397867 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 18:55:13.397902 systemd[1]: Reached target ignition-diskful.target. Feb 9 18:55:13.409626 systemd[1]: Mounted sysroot-usr.mount. Feb 9 18:55:13.424969 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:55:13.429461 systemd[1]: Starting initrd-setup-root.service... Feb 9 18:55:13.439301 initrd-setup-root[1168]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 18:55:13.451369 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1163) Feb 9 18:55:13.457656 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 9 18:55:13.457779 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 18:55:13.457807 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 18:55:13.458011 initrd-setup-root[1176]: cut: /sysroot/etc/group: No such file or directory Feb 9 18:55:13.465822 initrd-setup-root[1200]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 18:55:13.475120 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 18:55:13.479365 initrd-setup-root[1210]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 18:55:13.482559 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:55:13.705444 systemd[1]: Finished initrd-setup-root.service. Feb 9 18:55:13.714965 kernel: audit: type=1130 audit(1707504913.705:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.706775 systemd[1]: Starting ignition-mount.service... Feb 9 18:55:13.715972 systemd[1]: Starting sysroot-boot.service... Feb 9 18:55:13.727640 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 18:55:13.727773 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 18:55:13.756540 ignition[1229]: INFO : Ignition 2.14.0 Feb 9 18:55:13.759043 ignition[1229]: INFO : Stage: mount Feb 9 18:55:13.759043 ignition[1229]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:55:13.759043 ignition[1229]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:55:13.785250 ignition[1229]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:55:13.793663 ignition[1229]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:55:13.804981 ignition[1229]: INFO : PUT result: OK Feb 9 18:55:13.807246 systemd[1]: Finished sysroot-boot.service. Feb 9 18:55:13.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.815081 ignition[1229]: INFO : mount: mount passed Feb 9 18:55:13.815081 ignition[1229]: INFO : Ignition finished successfully Feb 9 18:55:13.821507 kernel: audit: type=1130 audit(1707504913.808:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.820259 systemd-networkd[1100]: eth0: Gained IPv6LL Feb 9 18:55:13.829526 kernel: audit: type=1130 audit(1707504913.822:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:13.821801 systemd[1]: Finished ignition-mount.service. Feb 9 18:55:13.824080 systemd[1]: Starting ignition-files.service... Feb 9 18:55:13.839597 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:55:13.859802 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1238) Feb 9 18:55:13.859864 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 9 18:55:13.859890 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 18:55:13.862444 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 18:55:13.869367 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 18:55:13.873111 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:55:13.886575 ignition[1257]: INFO : Ignition 2.14.0 Feb 9 18:55:13.886575 ignition[1257]: INFO : Stage: files Feb 9 18:55:13.888829 ignition[1257]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:55:13.888829 ignition[1257]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:55:13.899874 ignition[1257]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:55:13.901404 ignition[1257]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:55:13.903987 ignition[1257]: INFO : PUT result: OK Feb 9 18:55:13.908302 ignition[1257]: DEBUG : files: compiled without relabeling support, skipping Feb 9 18:55:13.914587 ignition[1257]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 18:55:13.916981 ignition[1257]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 18:55:13.939184 ignition[1257]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 18:55:13.941090 ignition[1257]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 18:55:13.942836 ignition[1257]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 18:55:13.942077 unknown[1257]: wrote ssh authorized keys file for user: core Feb 9 18:55:13.945813 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 18:55:13.949061 ignition[1257]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 18:55:14.275821 ignition[1257]: INFO : GET result: OK Feb 9 18:55:14.632315 ignition[1257]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 18:55:14.635310 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 18:55:14.635310 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 18:55:14.635310 ignition[1257]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 18:55:14.904903 ignition[1257]: INFO : GET result: OK Feb 9 18:55:15.069194 ignition[1257]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 18:55:15.072694 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 18:55:15.072694 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 18:55:15.072694 ignition[1257]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:55:15.084568 ignition[1257]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4071681059" Feb 9 18:55:15.089086 ignition[1257]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4071681059": device or resource busy Feb 9 18:55:15.089086 ignition[1257]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4071681059", trying btrfs: device or resource busy Feb 9 18:55:15.089086 ignition[1257]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4071681059" Feb 9 18:55:15.096700 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1262) Feb 9 18:55:15.096732 ignition[1257]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4071681059" Feb 9 18:55:15.104656 ignition[1257]: INFO : op(3): [started] unmounting "/mnt/oem4071681059" Feb 9 18:55:15.111349 systemd[1]: mnt-oem4071681059.mount: Deactivated successfully. Feb 9 18:55:15.117424 ignition[1257]: INFO : op(3): [finished] unmounting "/mnt/oem4071681059" Feb 9 18:55:15.119857 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 18:55:15.119857 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:55:15.119857 ignition[1257]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 18:55:15.231863 ignition[1257]: INFO : GET result: OK Feb 9 18:55:15.537284 ignition[1257]: DEBUG : file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 18:55:15.540367 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:55:15.540367 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:55:15.540367 ignition[1257]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 18:55:15.608668 ignition[1257]: INFO : GET result: OK Feb 9 18:55:16.356975 ignition[1257]: DEBUG : file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 18:55:16.360842 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:55:16.360842 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/install.sh" Feb 9 18:55:16.360842 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 18:55:16.360842 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:55:16.360842 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:55:16.373295 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:55:16.373295 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:55:16.373295 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 18:55:16.373295 ignition[1257]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:55:16.389291 ignition[1257]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1464176394" Feb 9 18:55:16.391019 ignition[1257]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1464176394": device or resource busy Feb 9 18:55:16.391019 ignition[1257]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1464176394", trying btrfs: device or resource busy Feb 9 18:55:16.391019 ignition[1257]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1464176394" Feb 9 18:55:16.397801 ignition[1257]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1464176394" Feb 9 18:55:16.397801 ignition[1257]: INFO : op(6): [started] unmounting "/mnt/oem1464176394" Feb 9 18:55:16.397801 ignition[1257]: INFO : op(6): [finished] unmounting "/mnt/oem1464176394" Feb 9 18:55:16.397801 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 18:55:16.397801 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 18:55:16.397801 ignition[1257]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:55:16.423354 ignition[1257]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3641659730" Feb 9 18:55:16.425580 ignition[1257]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3641659730": device or resource busy Feb 9 18:55:16.425580 ignition[1257]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3641659730", trying btrfs: device or resource busy Feb 9 18:55:16.425580 ignition[1257]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3641659730" Feb 9 18:55:16.450951 ignition[1257]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3641659730" Feb 9 18:55:16.450951 ignition[1257]: INFO : op(9): [started] unmounting "/mnt/oem3641659730" Feb 9 18:55:16.450951 ignition[1257]: INFO : op(9): [finished] unmounting "/mnt/oem3641659730" Feb 9 18:55:16.450951 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 18:55:16.450951 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:55:16.450951 ignition[1257]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:55:16.470911 systemd[1]: mnt-oem3641659730.mount: Deactivated successfully. Feb 9 18:55:16.484336 ignition[1257]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2294382927" Feb 9 18:55:16.487778 ignition[1257]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2294382927": device or resource busy Feb 9 18:55:16.487778 ignition[1257]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2294382927", trying btrfs: device or resource busy Feb 9 18:55:16.487778 ignition[1257]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2294382927" Feb 9 18:55:16.487778 ignition[1257]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2294382927" Feb 9 18:55:16.487778 ignition[1257]: INFO : op(c): [started] unmounting "/mnt/oem2294382927" Feb 9 18:55:16.487778 ignition[1257]: INFO : op(c): [finished] unmounting "/mnt/oem2294382927" Feb 9 18:55:16.487778 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:55:16.487778 ignition[1257]: INFO : files: op(e): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 18:55:16.487778 ignition[1257]: INFO : files: op(e): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 18:55:16.487778 ignition[1257]: INFO : files: op(f): [started] processing unit "amazon-ssm-agent.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(f): op(10): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(f): op(10): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(f): [finished] processing unit "amazon-ssm-agent.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(11): [started] processing unit "nvidia.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(11): [finished] processing unit "nvidia.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(12): [started] processing unit "prepare-cni-plugins.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(12): op(13): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(12): op(13): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(12): [finished] processing unit "prepare-cni-plugins.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(14): [started] processing unit "prepare-critools.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(14): op(15): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(14): op(15): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(14): [finished] processing unit "prepare-critools.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(16): [started] setting preset to enabled for "nvidia.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(16): [finished] setting preset to enabled for "nvidia.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Feb 9 18:55:16.507003 ignition[1257]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 18:55:16.557444 kernel: audit: type=1130 audit(1707504916.546:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.495104 systemd[1]: mnt-oem2294382927.mount: Deactivated successfully. Feb 9 18:55:16.559921 ignition[1257]: INFO : files: op(19): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 18:55:16.559921 ignition[1257]: INFO : files: op(19): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 18:55:16.559921 ignition[1257]: INFO : files: op(1a): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 18:55:16.559921 ignition[1257]: INFO : files: op(1a): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 18:55:16.559921 ignition[1257]: INFO : files: createResultFile: createFiles: op(1b): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:55:16.559921 ignition[1257]: INFO : files: createResultFile: createFiles: op(1b): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:55:16.559921 ignition[1257]: INFO : files: files passed Feb 9 18:55:16.559921 ignition[1257]: INFO : Ignition finished successfully Feb 9 18:55:16.545195 systemd[1]: Finished ignition-files.service. Feb 9 18:55:16.552125 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 18:55:16.559766 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 18:55:16.604878 kernel: audit: type=1130 audit(1707504916.591:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.604913 kernel: audit: type=1131 audit(1707504916.591:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.605031 initrd-setup-root-after-ignition[1282]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 18:55:16.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.566525 systemd[1]: Starting ignition-quench.service... Feb 9 18:55:16.583041 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 18:55:16.583309 systemd[1]: Finished ignition-quench.service. Feb 9 18:55:16.597914 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 18:55:16.605082 systemd[1]: Reached target ignition-complete.target. Feb 9 18:55:16.606525 systemd[1]: Starting initrd-parse-etc.service... Feb 9 18:55:16.632065 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 18:55:16.632187 systemd[1]: Finished initrd-parse-etc.service. Feb 9 18:55:16.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.634673 systemd[1]: Reached target initrd-fs.target. Feb 9 18:55:16.638137 systemd[1]: Reached target initrd.target. Feb 9 18:55:16.640135 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 18:55:16.642917 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 18:55:16.660095 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 18:55:16.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.663428 systemd[1]: Starting initrd-cleanup.service... Feb 9 18:55:16.687521 systemd[1]: Stopped target nss-lookup.target. Feb 9 18:55:16.687760 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 18:55:16.693698 systemd[1]: Stopped target timers.target. Feb 9 18:55:16.695519 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 18:55:16.697173 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 18:55:16.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.700501 systemd[1]: Stopped target initrd.target. Feb 9 18:55:16.702545 systemd[1]: Stopped target basic.target. Feb 9 18:55:16.704548 systemd[1]: Stopped target ignition-complete.target. Feb 9 18:55:16.708466 systemd[1]: Stopped target ignition-diskful.target. Feb 9 18:55:16.716118 systemd[1]: Stopped target initrd-root-device.target. Feb 9 18:55:16.721165 systemd[1]: Stopped target remote-fs.target. Feb 9 18:55:16.727796 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 18:55:16.733698 systemd[1]: Stopped target sysinit.target. Feb 9 18:55:16.735577 systemd[1]: Stopped target local-fs.target. Feb 9 18:55:16.737909 systemd[1]: Stopped target local-fs-pre.target. Feb 9 18:55:16.744941 systemd[1]: Stopped target swap.target. Feb 9 18:55:16.746631 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 18:55:16.747853 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 18:55:16.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.750209 systemd[1]: Stopped target cryptsetup.target. Feb 9 18:55:16.752095 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 18:55:16.753234 systemd[1]: Stopped dracut-initqueue.service. Feb 9 18:55:16.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.754995 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 18:55:16.756501 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 18:55:16.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.759630 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 18:55:16.759766 systemd[1]: Stopped ignition-files.service. Feb 9 18:55:16.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.766033 systemd[1]: Stopping ignition-mount.service... Feb 9 18:55:16.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.767213 systemd[1]: Stopping iscsiuio.service... Feb 9 18:55:16.770657 systemd[1]: Stopping sysroot-boot.service... Feb 9 18:55:16.771776 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 18:55:16.772033 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 18:55:16.773436 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 18:55:16.773591 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 18:55:16.780652 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 18:55:16.780772 systemd[1]: Stopped iscsiuio.service. Feb 9 18:55:16.782286 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 18:55:16.782497 systemd[1]: Finished initrd-cleanup.service. Feb 9 18:55:16.803226 ignition[1295]: INFO : Ignition 2.14.0 Feb 9 18:55:16.803226 ignition[1295]: INFO : Stage: umount Feb 9 18:55:16.809053 ignition[1295]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:55:16.809053 ignition[1295]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:55:16.813884 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 18:55:16.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.814001 systemd[1]: Stopped sysroot-boot.service. Feb 9 18:55:16.823640 ignition[1295]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:55:16.825907 ignition[1295]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:55:16.827729 ignition[1295]: INFO : PUT result: OK Feb 9 18:55:16.831622 ignition[1295]: INFO : umount: umount passed Feb 9 18:55:16.832939 ignition[1295]: INFO : Ignition finished successfully Feb 9 18:55:16.833197 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 18:55:16.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.833334 systemd[1]: Stopped ignition-mount.service. Feb 9 18:55:16.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.835327 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 18:55:16.835387 systemd[1]: Stopped ignition-disks.service. Feb 9 18:55:16.837518 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 18:55:16.837557 systemd[1]: Stopped ignition-kargs.service. Feb 9 18:55:16.838615 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 18:55:16.838651 systemd[1]: Stopped ignition-fetch.service. Feb 9 18:55:16.839567 systemd[1]: Stopped target network.target. Feb 9 18:55:16.840570 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 18:55:16.840611 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 18:55:16.846910 systemd[1]: Stopped target paths.target. Feb 9 18:55:16.852292 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 18:55:16.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.856521 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 18:55:16.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.860868 systemd[1]: Stopped target slices.target. Feb 9 18:55:16.862429 systemd[1]: Stopped target sockets.target. Feb 9 18:55:16.866180 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 18:55:16.866224 systemd[1]: Closed iscsid.socket. Feb 9 18:55:16.869112 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 18:55:16.869159 systemd[1]: Closed iscsiuio.socket. Feb 9 18:55:16.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.871847 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 18:55:16.871902 systemd[1]: Stopped ignition-setup.service. Feb 9 18:55:16.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.896000 audit: BPF prog-id=6 op=UNLOAD Feb 9 18:55:16.875670 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 18:55:16.875721 systemd[1]: Stopped initrd-setup-root.service. Feb 9 18:55:16.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.879369 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:55:16.881425 systemd[1]: Stopping systemd-resolved.service... Feb 9 18:55:16.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.882398 systemd-networkd[1100]: eth0: DHCPv6 lease lost Feb 9 18:55:16.906000 audit: BPF prog-id=9 op=UNLOAD Feb 9 18:55:16.886780 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:55:16.886907 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:55:16.890244 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 18:55:16.891069 systemd[1]: Stopped systemd-resolved.service. Feb 9 18:55:16.894392 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 18:55:16.894436 systemd[1]: Closed systemd-networkd.socket. Feb 9 18:55:16.896189 systemd[1]: Stopping network-cleanup.service... Feb 9 18:55:16.899042 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 18:55:16.899116 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 18:55:16.900987 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 18:55:16.901048 systemd[1]: Stopped systemd-sysctl.service. Feb 9 18:55:16.903208 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 18:55:16.903266 systemd[1]: Stopped systemd-modules-load.service. Feb 9 18:55:16.914217 systemd[1]: Stopping systemd-udevd.service... Feb 9 18:55:16.922660 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 18:55:16.922805 systemd[1]: Stopped systemd-udevd.service. Feb 9 18:55:16.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.934025 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 18:55:16.934112 systemd[1]: Stopped network-cleanup.service. Feb 9 18:55:16.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.936588 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 18:55:16.936627 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 18:55:16.943130 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 18:55:16.943178 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 18:55:16.946393 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 18:55:16.947688 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 18:55:16.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.950636 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 18:55:16.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.950696 systemd[1]: Stopped dracut-cmdline.service. Feb 9 18:55:16.952952 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 18:55:16.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.953006 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 18:55:16.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.958411 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 18:55:16.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.960093 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 18:55:16.960428 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 18:55:16.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:16.961696 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 18:55:16.961738 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 18:55:16.962782 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 18:55:16.962819 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 18:55:16.966472 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 18:55:16.966563 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 18:55:16.968065 systemd[1]: Reached target initrd-switch-root.target. Feb 9 18:55:16.971125 systemd[1]: Starting initrd-switch-root.service... Feb 9 18:55:16.985554 systemd[1]: Switching root. Feb 9 18:55:17.007364 systemd-journald[185]: Journal stopped Feb 9 18:55:23.868055 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Feb 9 18:55:23.868143 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 18:55:23.868173 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 18:55:23.868309 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 18:55:23.868330 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 18:55:23.869728 kernel: SELinux: policy capability open_perms=1 Feb 9 18:55:23.869756 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 18:55:23.869784 kernel: SELinux: policy capability always_check_network=0 Feb 9 18:55:23.869802 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 18:55:23.869822 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 18:55:23.869843 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 18:55:23.869862 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 18:55:23.869882 systemd[1]: Successfully loaded SELinux policy in 138.094ms. Feb 9 18:55:23.869910 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.719ms. Feb 9 18:55:23.869933 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:55:23.869957 systemd[1]: Detected virtualization amazon. Feb 9 18:55:23.869978 systemd[1]: Detected architecture x86-64. Feb 9 18:55:23.869998 systemd[1]: Detected first boot. Feb 9 18:55:23.870020 systemd[1]: Initializing machine ID from VM UUID. Feb 9 18:55:23.870041 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 9 18:55:23.870067 kernel: audit: type=1400 audit(1707504918.232:79): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:55:23.870087 kernel: audit: type=1400 audit(1707504918.232:80): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:55:23.870109 kernel: audit: type=1334 audit(1707504918.233:81): prog-id=10 op=LOAD Feb 9 18:55:23.870128 kernel: audit: type=1334 audit(1707504918.233:82): prog-id=10 op=UNLOAD Feb 9 18:55:23.870147 kernel: audit: type=1334 audit(1707504918.241:83): prog-id=11 op=LOAD Feb 9 18:55:23.870166 kernel: audit: type=1334 audit(1707504918.241:84): prog-id=11 op=UNLOAD Feb 9 18:55:23.870186 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 18:55:23.870206 kernel: audit: type=1400 audit(1707504918.551:85): avc: denied { associate } for pid=1328 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:55:23.870227 kernel: audit: type=1300 audit(1707504918.551:85): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1311 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:23.870251 kernel: audit: type=1327 audit(1707504918.551:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:55:23.870272 kernel: audit: type=1400 audit(1707504918.554:86): avc: denied { associate } for pid=1328 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:55:23.870292 systemd[1]: Populated /etc with preset unit settings. Feb 9 18:55:23.870312 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:55:23.870333 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:55:23.870401 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:55:23.870426 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 9 18:55:23.870445 kernel: audit: type=1334 audit(1707504923.521:87): prog-id=12 op=LOAD Feb 9 18:55:23.870465 kernel: audit: type=1334 audit(1707504923.521:88): prog-id=3 op=UNLOAD Feb 9 18:55:23.870483 kernel: audit: type=1334 audit(1707504923.522:89): prog-id=13 op=LOAD Feb 9 18:55:23.870501 kernel: audit: type=1334 audit(1707504923.524:90): prog-id=14 op=LOAD Feb 9 18:55:23.870520 kernel: audit: type=1334 audit(1707504923.524:91): prog-id=4 op=UNLOAD Feb 9 18:55:23.870538 kernel: audit: type=1334 audit(1707504923.524:92): prog-id=5 op=UNLOAD Feb 9 18:55:23.870558 kernel: audit: type=1334 audit(1707504923.526:93): prog-id=15 op=LOAD Feb 9 18:55:23.870576 kernel: audit: type=1334 audit(1707504923.526:94): prog-id=12 op=UNLOAD Feb 9 18:55:23.870595 kernel: audit: type=1334 audit(1707504923.528:95): prog-id=16 op=LOAD Feb 9 18:55:23.870613 kernel: audit: type=1334 audit(1707504923.530:96): prog-id=17 op=LOAD Feb 9 18:55:23.870633 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 18:55:23.870659 systemd[1]: Stopped iscsid.service. Feb 9 18:55:23.870680 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 18:55:23.870701 systemd[1]: Stopped initrd-switch-root.service. Feb 9 18:55:23.870724 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 18:55:23.870749 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 18:55:23.870771 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 18:55:23.870794 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 18:55:23.870813 systemd[1]: Created slice system-getty.slice. Feb 9 18:55:23.870832 systemd[1]: Created slice system-modprobe.slice. Feb 9 18:55:23.870851 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 18:55:23.870871 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 18:55:23.870891 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 18:55:23.870910 systemd[1]: Created slice user.slice. Feb 9 18:55:23.870931 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:55:23.870955 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 18:55:23.870975 systemd[1]: Set up automount boot.automount. Feb 9 18:55:23.870997 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 18:55:23.871017 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 18:55:23.871038 systemd[1]: Stopped target initrd-fs.target. Feb 9 18:55:23.871058 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 18:55:23.871076 systemd[1]: Reached target integritysetup.target. Feb 9 18:55:23.871093 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:55:23.871108 systemd[1]: Reached target remote-fs.target. Feb 9 18:55:23.871120 systemd[1]: Reached target slices.target. Feb 9 18:55:23.871133 systemd[1]: Reached target swap.target. Feb 9 18:55:23.871145 systemd[1]: Reached target torcx.target. Feb 9 18:55:23.871158 systemd[1]: Reached target veritysetup.target. Feb 9 18:55:23.871170 systemd[1]: Listening on systemd-coredump.socket. Feb 9 18:55:23.871182 systemd[1]: Listening on systemd-initctl.socket. Feb 9 18:55:23.871194 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:55:23.871206 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:55:23.871218 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:55:23.871232 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 18:55:23.871243 systemd[1]: Mounting dev-hugepages.mount... Feb 9 18:55:23.871256 systemd[1]: Mounting dev-mqueue.mount... Feb 9 18:55:23.871275 systemd[1]: Mounting media.mount... Feb 9 18:55:23.871289 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 18:55:23.871303 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 18:55:23.871315 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 18:55:23.871327 systemd[1]: Mounting tmp.mount... Feb 9 18:55:23.873801 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 18:55:23.873847 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 18:55:23.873867 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:55:23.873899 systemd[1]: Starting modprobe@configfs.service... Feb 9 18:55:23.873924 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 18:55:23.873943 systemd[1]: Starting modprobe@drm.service... Feb 9 18:55:23.873966 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 18:55:23.873988 systemd[1]: Starting modprobe@fuse.service... Feb 9 18:55:23.874008 systemd[1]: Starting modprobe@loop.service... Feb 9 18:55:23.874030 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 18:55:23.874051 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 18:55:23.874072 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 18:55:23.874092 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 18:55:23.874113 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 18:55:23.874139 systemd[1]: Stopped systemd-journald.service. Feb 9 18:55:23.874161 systemd[1]: Starting systemd-journald.service... Feb 9 18:55:23.874184 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:55:23.874206 systemd[1]: Starting systemd-network-generator.service... Feb 9 18:55:23.874228 systemd[1]: Starting systemd-remount-fs.service... Feb 9 18:55:23.874250 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:55:23.874270 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 18:55:23.874289 systemd[1]: Stopped verity-setup.service. Feb 9 18:55:23.874307 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 18:55:23.874325 systemd[1]: Mounted dev-hugepages.mount. Feb 9 18:55:23.876549 systemd[1]: Mounted dev-mqueue.mount. Feb 9 18:55:23.876586 systemd[1]: Mounted media.mount. Feb 9 18:55:23.876606 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 18:55:23.876626 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 18:55:23.876645 systemd[1]: Mounted tmp.mount. Feb 9 18:55:23.876664 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:55:23.876683 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 18:55:23.876703 systemd[1]: Finished modprobe@configfs.service. Feb 9 18:55:23.876728 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 18:55:23.876748 kernel: loop: module loaded Feb 9 18:55:23.876770 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 18:55:23.876789 kernel: fuse: init (API version 7.34) Feb 9 18:55:23.876880 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 18:55:23.876902 systemd[1]: Finished modprobe@drm.service. Feb 9 18:55:23.876931 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 18:55:23.876951 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 18:55:23.876970 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 18:55:23.876989 systemd[1]: Finished modprobe@loop.service. Feb 9 18:55:23.877013 systemd[1]: Finished systemd-network-generator.service. Feb 9 18:55:23.877036 systemd[1]: Finished systemd-remount-fs.service. Feb 9 18:55:23.877057 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:55:23.877081 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 18:55:23.877105 systemd[1]: Finished modprobe@fuse.service. Feb 9 18:55:23.877130 systemd[1]: Reached target network-pre.target. Feb 9 18:55:23.877156 systemd-journald[1404]: Journal started Feb 9 18:55:23.877235 systemd-journald[1404]: Runtime Journal (/run/log/journal/ec2823c62fd1d4ebc486ab9dcea05f0f) is 4.8M, max 38.7M, 33.9M free. Feb 9 18:55:17.974000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:55:18.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:55:18.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:55:18.233000 audit: BPF prog-id=10 op=LOAD Feb 9 18:55:18.233000 audit: BPF prog-id=10 op=UNLOAD Feb 9 18:55:18.241000 audit: BPF prog-id=11 op=LOAD Feb 9 18:55:18.241000 audit: BPF prog-id=11 op=UNLOAD Feb 9 18:55:18.551000 audit[1328]: AVC avc: denied { associate } for pid=1328 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:55:18.551000 audit[1328]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1311 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.551000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:55:18.554000 audit[1328]: AVC avc: denied { associate } for pid=1328 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:55:18.554000 audit[1328]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1311 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.554000 audit: CWD cwd="/" Feb 9 18:55:18.554000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:18.554000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:18.554000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:55:23.521000 audit: BPF prog-id=12 op=LOAD Feb 9 18:55:23.521000 audit: BPF prog-id=3 op=UNLOAD Feb 9 18:55:23.522000 audit: BPF prog-id=13 op=LOAD Feb 9 18:55:23.524000 audit: BPF prog-id=14 op=LOAD Feb 9 18:55:23.524000 audit: BPF prog-id=4 op=UNLOAD Feb 9 18:55:23.524000 audit: BPF prog-id=5 op=UNLOAD Feb 9 18:55:23.526000 audit: BPF prog-id=15 op=LOAD Feb 9 18:55:23.526000 audit: BPF prog-id=12 op=UNLOAD Feb 9 18:55:23.528000 audit: BPF prog-id=16 op=LOAD Feb 9 18:55:23.530000 audit: BPF prog-id=17 op=LOAD Feb 9 18:55:23.530000 audit: BPF prog-id=13 op=UNLOAD Feb 9 18:55:23.530000 audit: BPF prog-id=14 op=UNLOAD Feb 9 18:55:23.533000 audit: BPF prog-id=18 op=LOAD Feb 9 18:55:23.533000 audit: BPF prog-id=15 op=UNLOAD Feb 9 18:55:23.882271 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 18:55:23.535000 audit: BPF prog-id=19 op=LOAD Feb 9 18:55:23.537000 audit: BPF prog-id=20 op=LOAD Feb 9 18:55:23.537000 audit: BPF prog-id=16 op=UNLOAD Feb 9 18:55:23.537000 audit: BPF prog-id=17 op=UNLOAD Feb 9 18:55:23.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.543000 audit: BPF prog-id=18 op=UNLOAD Feb 9 18:55:23.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.772000 audit: BPF prog-id=21 op=LOAD Feb 9 18:55:23.772000 audit: BPF prog-id=22 op=LOAD Feb 9 18:55:23.772000 audit: BPF prog-id=23 op=LOAD Feb 9 18:55:23.772000 audit: BPF prog-id=19 op=UNLOAD Feb 9 18:55:23.772000 audit: BPF prog-id=20 op=UNLOAD Feb 9 18:55:23.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.864000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 18:55:23.864000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff764e5de0 a2=4000 a3=7fff764e5e7c items=0 ppid=1 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:23.864000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 18:55:23.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:18.549590 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:55:23.519097 systemd[1]: Queued start job for default target multi-user.target. Feb 9 18:55:23.884399 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 18:55:18.550234 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:55:23.539145 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 18:55:18.550254 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:55:18.550285 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 18:55:18.550295 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 18:55:18.550395 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 18:55:18.550409 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 18:55:18.550799 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 18:55:18.550844 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:55:18.550857 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:55:18.551482 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 18:55:18.551516 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 18:55:18.551534 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 18:55:18.551548 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 18:55:18.551564 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 18:55:18.551577 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 18:55:22.779199 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:22Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:55:22.779661 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:22Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:55:22.779892 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:22Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:55:22.780907 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:22Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:55:22.780963 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:22Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 18:55:22.781027 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-09T18:55:22Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 18:55:23.893364 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 18:55:23.898613 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 18:55:23.898677 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 18:55:23.905693 systemd[1]: Starting systemd-random-seed.service... Feb 9 18:55:23.909383 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 18:55:23.912360 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:55:23.920961 systemd[1]: Started systemd-journald.service. Feb 9 18:55:23.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.923483 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 18:55:23.924782 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 18:55:23.927629 systemd[1]: Starting systemd-journal-flush.service... Feb 9 18:55:23.934689 systemd[1]: Finished systemd-random-seed.service. Feb 9 18:55:23.936018 systemd[1]: Reached target first-boot-complete.target. Feb 9 18:55:23.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.948643 systemd-journald[1404]: Time spent on flushing to /var/log/journal/ec2823c62fd1d4ebc486ab9dcea05f0f is 72.807ms for 1217 entries. Feb 9 18:55:23.948643 systemd-journald[1404]: System Journal (/var/log/journal/ec2823c62fd1d4ebc486ab9dcea05f0f) is 8.0M, max 195.6M, 187.6M free. Feb 9 18:55:24.063167 systemd-journald[1404]: Received client request to flush runtime journal. Feb 9 18:55:23.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:24.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:24.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:23.953631 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:55:23.998333 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 18:55:24.001408 systemd[1]: Starting systemd-sysusers.service... Feb 9 18:55:24.066776 udevadm[1444]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 18:55:24.044930 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:55:24.048013 systemd[1]: Starting systemd-udev-settle.service... Feb 9 18:55:24.064377 systemd[1]: Finished systemd-journal-flush.service. Feb 9 18:55:24.269854 systemd[1]: Finished systemd-sysusers.service. Feb 9 18:55:24.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:24.273364 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:55:24.381863 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:55:24.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:24.813264 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 18:55:24.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:24.816000 audit: BPF prog-id=24 op=LOAD Feb 9 18:55:24.816000 audit: BPF prog-id=25 op=LOAD Feb 9 18:55:24.816000 audit: BPF prog-id=7 op=UNLOAD Feb 9 18:55:24.816000 audit: BPF prog-id=8 op=UNLOAD Feb 9 18:55:24.818027 systemd[1]: Starting systemd-udevd.service... Feb 9 18:55:24.845991 systemd-udevd[1447]: Using default interface naming scheme 'v252'. Feb 9 18:55:24.908206 systemd[1]: Started systemd-udevd.service. Feb 9 18:55:24.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:24.910000 audit: BPF prog-id=26 op=LOAD Feb 9 18:55:24.911989 systemd[1]: Starting systemd-networkd.service... Feb 9 18:55:24.930000 audit: BPF prog-id=27 op=LOAD Feb 9 18:55:24.931000 audit: BPF prog-id=28 op=LOAD Feb 9 18:55:24.931000 audit: BPF prog-id=29 op=LOAD Feb 9 18:55:24.932310 systemd[1]: Starting systemd-userdbd.service... Feb 9 18:55:24.974933 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 18:55:24.981067 (udev-worker)[1452]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:55:24.983960 systemd[1]: Started systemd-userdbd.service. Feb 9 18:55:24.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:25.079373 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 18:55:25.089042 kernel: ACPI: button: Power Button [PWRF] Feb 9 18:55:25.089155 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Feb 9 18:55:25.090396 kernel: ACPI: button: Sleep Button [SLPF] Feb 9 18:55:25.110682 systemd-networkd[1453]: lo: Link UP Feb 9 18:55:25.110697 systemd-networkd[1453]: lo: Gained carrier Feb 9 18:55:25.111284 systemd-networkd[1453]: Enumeration completed Feb 9 18:55:25.111419 systemd[1]: Started systemd-networkd.service. Feb 9 18:55:25.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:25.111666 systemd-networkd[1453]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:55:25.114440 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:55:25.117538 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:55:25.116295 systemd-networkd[1453]: eth0: Link UP Feb 9 18:55:25.116514 systemd-networkd[1453]: eth0: Gained carrier Feb 9 18:55:25.098000 audit[1452]: AVC avc: denied { confidentiality } for pid=1452 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 18:55:25.124499 systemd-networkd[1453]: eth0: DHCPv4 address 172.31.20.217/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 18:55:25.098000 audit[1452]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5648319b2040 a1=32194 a2=7f21b6624bc5 a3=5 items=108 ppid=1447 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:25.098000 audit: CWD cwd="/" Feb 9 18:55:25.098000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=1 name=(null) inode=15068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=2 name=(null) inode=15068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=3 name=(null) inode=15069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=4 name=(null) inode=15068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=5 name=(null) inode=15070 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=6 name=(null) inode=15068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=7 name=(null) inode=15071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=8 name=(null) inode=15071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=9 name=(null) inode=15072 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=10 name=(null) inode=15071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=11 name=(null) inode=15073 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=12 name=(null) inode=15071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=13 name=(null) inode=15074 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=14 name=(null) inode=15071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=15 name=(null) inode=15075 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=16 name=(null) inode=15071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=17 name=(null) inode=15076 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=18 name=(null) inode=15068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=19 name=(null) inode=15077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=20 name=(null) inode=15077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=21 name=(null) inode=15078 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=22 name=(null) inode=15077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=23 name=(null) inode=15079 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=24 name=(null) inode=15077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=25 name=(null) inode=15080 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=26 name=(null) inode=15077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=27 name=(null) inode=15088 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=28 name=(null) inode=15077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=29 name=(null) inode=15089 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=30 name=(null) inode=15068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=31 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=32 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=33 name=(null) inode=15091 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=34 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=35 name=(null) inode=15092 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=36 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=37 name=(null) inode=15093 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=38 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=39 name=(null) inode=15094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=40 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=41 name=(null) inode=15095 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=42 name=(null) inode=15068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=43 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=44 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=45 name=(null) inode=15097 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=46 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=47 name=(null) inode=15098 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=48 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=49 name=(null) inode=15099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=50 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=51 name=(null) inode=15100 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=52 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=53 name=(null) inode=15101 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=55 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=56 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=57 name=(null) inode=15103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=58 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=59 name=(null) inode=15104 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=60 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=61 name=(null) inode=15105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=62 name=(null) inode=15105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=63 name=(null) inode=15106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=64 name=(null) inode=15105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=65 name=(null) inode=15107 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=66 name=(null) inode=15105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=67 name=(null) inode=15108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=68 name=(null) inode=15105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=69 name=(null) inode=15109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=70 name=(null) inode=15105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=71 name=(null) inode=15110 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=72 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=73 name=(null) inode=15111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=74 name=(null) inode=15111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=75 name=(null) inode=15112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=76 name=(null) inode=15111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=77 name=(null) inode=15113 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=78 name=(null) inode=15111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=79 name=(null) inode=15114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=80 name=(null) inode=15111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=81 name=(null) inode=15115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=82 name=(null) inode=15111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=83 name=(null) inode=15116 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=84 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=85 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=86 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=87 name=(null) inode=15118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=88 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=89 name=(null) inode=15119 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=90 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=91 name=(null) inode=15120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=92 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=93 name=(null) inode=15121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=94 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=95 name=(null) inode=15122 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=96 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=97 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=98 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=99 name=(null) inode=15124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=100 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=101 name=(null) inode=15125 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=102 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=103 name=(null) inode=15126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=104 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=105 name=(null) inode=15127 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=106 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PATH item=107 name=(null) inode=15128 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:25.098000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 18:55:25.167954 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Feb 9 18:55:25.183365 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Feb 9 18:55:25.200388 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 18:55:25.219403 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1457) Feb 9 18:55:25.316401 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:55:25.394884 systemd[1]: Finished systemd-udev-settle.service. Feb 9 18:55:25.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:25.398567 systemd[1]: Starting lvm2-activation-early.service... Feb 9 18:55:25.486253 lvm[1561]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:55:25.516611 systemd[1]: Finished lvm2-activation-early.service. Feb 9 18:55:25.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:25.517975 systemd[1]: Reached target cryptsetup.target. Feb 9 18:55:25.522104 systemd[1]: Starting lvm2-activation.service... Feb 9 18:55:25.533141 lvm[1562]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:55:25.564026 systemd[1]: Finished lvm2-activation.service. Feb 9 18:55:25.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:25.566716 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:55:25.568097 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 18:55:25.568134 systemd[1]: Reached target local-fs.target. Feb 9 18:55:25.569414 systemd[1]: Reached target machines.target. Feb 9 18:55:25.578745 systemd[1]: Starting ldconfig.service... Feb 9 18:55:25.581906 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 18:55:25.581996 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:55:25.583218 systemd[1]: Starting systemd-boot-update.service... Feb 9 18:55:25.587138 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 18:55:25.590370 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 18:55:25.592116 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:55:25.592212 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:55:25.594077 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 18:55:25.629174 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 18:55:25.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:25.635549 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1564 (bootctl) Feb 9 18:55:25.638637 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 18:55:25.656568 systemd-tmpfiles[1567]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 18:55:25.659881 systemd-tmpfiles[1567]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 18:55:25.683722 systemd-tmpfiles[1567]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 18:55:25.830127 systemd-fsck[1572]: fsck.fat 4.2 (2021-01-31) Feb 9 18:55:25.830127 systemd-fsck[1572]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters Feb 9 18:55:25.832611 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 18:55:25.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:25.836531 systemd[1]: Mounting boot.mount... Feb 9 18:55:25.852913 systemd[1]: Mounted boot.mount. Feb 9 18:55:25.880854 systemd[1]: Finished systemd-boot-update.service. Feb 9 18:55:25.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:25.990580 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 18:55:25.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:25.993224 systemd[1]: Starting audit-rules.service... Feb 9 18:55:26.004000 audit: BPF prog-id=30 op=LOAD Feb 9 18:55:25.996804 systemd[1]: Starting clean-ca-certificates.service... Feb 9 18:55:26.000277 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 18:55:26.006358 systemd[1]: Starting systemd-resolved.service... Feb 9 18:55:26.008000 audit: BPF prog-id=31 op=LOAD Feb 9 18:55:26.012578 systemd[1]: Starting systemd-timesyncd.service... Feb 9 18:55:26.019487 systemd[1]: Starting systemd-update-utmp.service... Feb 9 18:55:26.037718 systemd[1]: Finished clean-ca-certificates.service. Feb 9 18:55:26.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:26.039301 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 18:55:26.057000 audit[1596]: SYSTEM_BOOT pid=1596 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 18:55:26.065552 systemd[1]: Finished systemd-update-utmp.service. Feb 9 18:55:26.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:26.121884 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 18:55:26.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:26.175623 augenrules[1608]: No rules Feb 9 18:55:26.174000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:55:26.174000 audit[1608]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca8c28300 a2=420 a3=0 items=0 ppid=1588 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:26.174000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 18:55:26.176429 systemd[1]: Finished audit-rules.service. Feb 9 18:55:26.193437 systemd[1]: Started systemd-timesyncd.service. Feb 9 18:55:26.195564 systemd[1]: Reached target time-set.target. Feb 9 18:55:26.199913 systemd-resolved[1592]: Positive Trust Anchors: Feb 9 18:55:26.199931 systemd-resolved[1592]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:55:26.200086 systemd-resolved[1592]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:55:26.236904 systemd-resolved[1592]: Defaulting to hostname 'linux'. Feb 9 18:55:26.240596 systemd[1]: Started systemd-resolved.service. Feb 9 18:55:26.241955 systemd[1]: Reached target network.target. Feb 9 18:55:26.243353 systemd[1]: Reached target nss-lookup.target. Feb 9 18:55:26.284010 systemd-timesyncd[1595]: Contacted time server 135.148.100.14:123 (0.flatcar.pool.ntp.org). Feb 9 18:55:26.284398 systemd-timesyncd[1595]: Initial clock synchronization to Fri 2024-02-09 18:55:26.565813 UTC. Feb 9 18:55:26.998878 systemd-networkd[1453]: eth0: Gained IPv6LL Feb 9 18:55:27.002927 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:55:27.004440 systemd[1]: Reached target network-online.target. Feb 9 18:55:27.059947 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 18:55:27.060805 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 18:55:27.270024 ldconfig[1563]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 18:55:27.280230 systemd[1]: Finished ldconfig.service. Feb 9 18:55:27.282986 systemd[1]: Starting systemd-update-done.service... Feb 9 18:55:27.296278 systemd[1]: Finished systemd-update-done.service. Feb 9 18:55:27.298164 systemd[1]: Reached target sysinit.target. Feb 9 18:55:27.299642 systemd[1]: Started motdgen.path. Feb 9 18:55:27.300958 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 18:55:27.302612 systemd[1]: Started logrotate.timer. Feb 9 18:55:27.303720 systemd[1]: Started mdadm.timer. Feb 9 18:55:27.304528 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 18:55:27.305830 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 18:55:27.305874 systemd[1]: Reached target paths.target. Feb 9 18:55:27.306974 systemd[1]: Reached target timers.target. Feb 9 18:55:27.309651 systemd[1]: Listening on dbus.socket. Feb 9 18:55:27.313571 systemd[1]: Starting docker.socket... Feb 9 18:55:27.319072 systemd[1]: Listening on sshd.socket. Feb 9 18:55:27.320409 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:55:27.321279 systemd[1]: Listening on docker.socket. Feb 9 18:55:27.322454 systemd[1]: Reached target sockets.target. Feb 9 18:55:27.323404 systemd[1]: Reached target basic.target. Feb 9 18:55:27.324304 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:55:27.324364 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:55:27.325880 systemd[1]: Started amazon-ssm-agent.service. Feb 9 18:55:27.331619 systemd[1]: Starting containerd.service... Feb 9 18:55:27.334114 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 18:55:27.337165 systemd[1]: Starting dbus.service... Feb 9 18:55:27.340322 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 18:55:27.343691 systemd[1]: Starting extend-filesystems.service... Feb 9 18:55:27.345668 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 18:55:27.357575 systemd[1]: Starting motdgen.service... Feb 9 18:55:27.365137 systemd[1]: Started nvidia.service. Feb 9 18:55:27.368606 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 18:55:27.373535 systemd[1]: Starting prepare-critools.service... Feb 9 18:55:27.462745 jq[1623]: false Feb 9 18:55:27.377212 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 18:55:27.380564 systemd[1]: Starting sshd-keygen.service... Feb 9 18:55:27.388851 systemd[1]: Starting systemd-logind.service... Feb 9 18:55:27.390002 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:55:27.390086 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 18:55:27.390740 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 18:55:27.505196 jq[1635]: true Feb 9 18:55:27.392587 systemd[1]: Starting update-engine.service... Feb 9 18:55:27.397496 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 18:55:27.416851 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 18:55:27.417140 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 18:55:27.513025 jq[1642]: true Feb 9 18:55:27.501451 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 18:55:27.501676 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 18:55:27.541405 tar[1638]: ./ Feb 9 18:55:27.541405 tar[1638]: ./loopback Feb 9 18:55:27.544811 tar[1637]: crictl Feb 9 18:55:27.650487 extend-filesystems[1624]: Found nvme0n1 Feb 9 18:55:27.650487 extend-filesystems[1624]: Found nvme0n1p1 Feb 9 18:55:27.650487 extend-filesystems[1624]: Found nvme0n1p2 Feb 9 18:55:27.650487 extend-filesystems[1624]: Found nvme0n1p3 Feb 9 18:55:27.650487 extend-filesystems[1624]: Found usr Feb 9 18:55:27.650487 extend-filesystems[1624]: Found nvme0n1p4 Feb 9 18:55:27.650487 extend-filesystems[1624]: Found nvme0n1p6 Feb 9 18:55:27.650487 extend-filesystems[1624]: Found nvme0n1p7 Feb 9 18:55:27.650487 extend-filesystems[1624]: Found nvme0n1p9 Feb 9 18:55:27.650487 extend-filesystems[1624]: Checking size of /dev/nvme0n1p9 Feb 9 18:55:27.703771 extend-filesystems[1624]: Resized partition /dev/nvme0n1p9 Feb 9 18:55:27.707911 dbus-daemon[1622]: [system] SELinux support is enabled Feb 9 18:55:27.713039 dbus-daemon[1622]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1453 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 18:55:27.708112 systemd[1]: Started dbus.service. Feb 9 18:55:27.712446 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 18:55:27.712484 systemd[1]: Reached target system-config.target. Feb 9 18:55:27.713889 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 18:55:27.713915 systemd[1]: Reached target user-config.target. Feb 9 18:55:27.726843 extend-filesystems[1673]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 18:55:27.743405 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 9 18:55:27.743634 dbus-daemon[1622]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 18:55:27.751047 systemd[1]: Starting systemd-hostnamed.service... Feb 9 18:55:27.797316 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 18:55:27.797563 systemd[1]: Finished motdgen.service. Feb 9 18:55:27.942413 amazon-ssm-agent[1619]: 2024/02/09 18:55:27 Failed to load instance info from vault. RegistrationKey does not exist. Feb 9 18:55:27.945297 amazon-ssm-agent[1619]: Initializing new seelog logger Feb 9 18:55:27.946056 amazon-ssm-agent[1619]: New Seelog Logger Creation Complete Feb 9 18:55:27.946313 amazon-ssm-agent[1619]: 2024/02/09 18:55:27 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 18:55:27.946628 amazon-ssm-agent[1619]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 18:55:27.947432 amazon-ssm-agent[1619]: 2024/02/09 18:55:27 processing appconfig overrides Feb 9 18:55:27.951436 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 9 18:55:27.990524 update_engine[1634]: I0209 18:55:27.955610 1634 main.cc:92] Flatcar Update Engine starting Feb 9 18:55:27.990524 update_engine[1634]: I0209 18:55:27.963367 1634 update_check_scheduler.cc:74] Next update check in 11m8s Feb 9 18:55:27.963072 systemd[1]: Started update-engine.service. Feb 9 18:55:27.966662 systemd[1]: Started locksmithd.service. Feb 9 18:55:27.991830 extend-filesystems[1673]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 9 18:55:27.991830 extend-filesystems[1673]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 18:55:27.991830 extend-filesystems[1673]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 9 18:55:28.009605 extend-filesystems[1624]: Resized filesystem in /dev/nvme0n1p9 Feb 9 18:55:27.995740 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 18:55:27.996020 systemd[1]: Finished extend-filesystems.service. Feb 9 18:55:28.012311 systemd-logind[1633]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 18:55:28.013562 env[1645]: time="2024-02-09T18:55:28.012893581Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 18:55:28.014956 bash[1694]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:55:28.015781 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 18:55:28.017418 systemd-logind[1633]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 18:55:28.017453 systemd-logind[1633]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 18:55:28.022021 systemd-logind[1633]: New seat seat0. Feb 9 18:55:28.034121 systemd[1]: Started systemd-logind.service. Feb 9 18:55:28.060170 tar[1638]: ./bandwidth Feb 9 18:55:28.106477 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 18:55:28.228254 env[1645]: time="2024-02-09T18:55:28.228170728Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 18:55:28.233862 env[1645]: time="2024-02-09T18:55:28.233812387Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:28.236866 env[1645]: time="2024-02-09T18:55:28.236817359Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:55:28.237410 env[1645]: time="2024-02-09T18:55:28.237381114Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:28.238294 env[1645]: time="2024-02-09T18:55:28.238261003Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:55:28.242272 env[1645]: time="2024-02-09T18:55:28.242241677Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:28.243138 env[1645]: time="2024-02-09T18:55:28.243105493Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 18:55:28.243274 env[1645]: time="2024-02-09T18:55:28.243254375Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:28.244195 env[1645]: time="2024-02-09T18:55:28.244153431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:28.250022 env[1645]: time="2024-02-09T18:55:28.249973563Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:28.253450 env[1645]: time="2024-02-09T18:55:28.253395694Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:55:28.254516 env[1645]: time="2024-02-09T18:55:28.254486035Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 18:55:28.254772 env[1645]: time="2024-02-09T18:55:28.254748803Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 18:55:28.254908 env[1645]: time="2024-02-09T18:55:28.254890768Z" level=info msg="metadata content store policy set" policy=shared Feb 9 18:55:28.263400 dbus-daemon[1622]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 18:55:28.263612 systemd[1]: Started systemd-hostnamed.service. Feb 9 18:55:28.266315 env[1645]: time="2024-02-09T18:55:28.266277129Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 18:55:28.266488 env[1645]: time="2024-02-09T18:55:28.266468309Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 18:55:28.266576 env[1645]: time="2024-02-09T18:55:28.266559282Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 18:55:28.266706 env[1645]: time="2024-02-09T18:55:28.266683816Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 18:55:28.266862 env[1645]: time="2024-02-09T18:55:28.266844716Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 18:55:28.266953 env[1645]: time="2024-02-09T18:55:28.266939903Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 18:55:28.267030 env[1645]: time="2024-02-09T18:55:28.267014347Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 18:55:28.267113 env[1645]: time="2024-02-09T18:55:28.267098430Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 18:55:28.267192 env[1645]: time="2024-02-09T18:55:28.267178487Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 18:55:28.267260 env[1645]: time="2024-02-09T18:55:28.267247710Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 18:55:28.267326 env[1645]: time="2024-02-09T18:55:28.267311326Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 18:55:28.267449 env[1645]: time="2024-02-09T18:55:28.267432529Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 18:55:28.267649 env[1645]: time="2024-02-09T18:55:28.267632783Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 18:55:28.267820 env[1645]: time="2024-02-09T18:55:28.267801205Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 18:55:28.268355 env[1645]: time="2024-02-09T18:55:28.268321018Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 18:55:28.268488 env[1645]: time="2024-02-09T18:55:28.268468855Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.268572 env[1645]: time="2024-02-09T18:55:28.268557119Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 18:55:28.268702 env[1645]: time="2024-02-09T18:55:28.268684417Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.268854 env[1645]: time="2024-02-09T18:55:28.268836854Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.268931 env[1645]: time="2024-02-09T18:55:28.268918631Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.269005 env[1645]: time="2024-02-09T18:55:28.268990620Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.269075 env[1645]: time="2024-02-09T18:55:28.269061121Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.269150 env[1645]: time="2024-02-09T18:55:28.269134845Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.269212 env[1645]: time="2024-02-09T18:55:28.269198915Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.269289 env[1645]: time="2024-02-09T18:55:28.269274890Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.269409 env[1645]: time="2024-02-09T18:55:28.269393732Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 18:55:28.269660 env[1645]: time="2024-02-09T18:55:28.269639360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.269759 env[1645]: time="2024-02-09T18:55:28.269743395Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.269835 env[1645]: time="2024-02-09T18:55:28.269821134Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.269914 env[1645]: time="2024-02-09T18:55:28.269899966Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 18:55:28.270003 env[1645]: time="2024-02-09T18:55:28.269983920Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 18:55:28.270073 env[1645]: time="2024-02-09T18:55:28.270058214Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 18:55:28.270162 env[1645]: time="2024-02-09T18:55:28.270146158Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 18:55:28.270267 env[1645]: time="2024-02-09T18:55:28.270253091Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 18:55:28.270705 env[1645]: time="2024-02-09T18:55:28.270622291Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 18:55:28.273385 env[1645]: time="2024-02-09T18:55:28.270857559Z" level=info msg="Connect containerd service" Feb 9 18:55:28.273385 env[1645]: time="2024-02-09T18:55:28.270907341Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 18:55:28.273385 env[1645]: time="2024-02-09T18:55:28.271744763Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:55:28.273385 env[1645]: time="2024-02-09T18:55:28.272096655Z" level=info msg="Start subscribing containerd event" Feb 9 18:55:28.273385 env[1645]: time="2024-02-09T18:55:28.272252311Z" level=info msg="Start recovering state" Feb 9 18:55:28.273385 env[1645]: time="2024-02-09T18:55:28.272467667Z" level=info msg="Start event monitor" Feb 9 18:55:28.273385 env[1645]: time="2024-02-09T18:55:28.272502954Z" level=info msg="Start snapshots syncer" Feb 9 18:55:28.273385 env[1645]: time="2024-02-09T18:55:28.272517867Z" level=info msg="Start cni network conf syncer for default" Feb 9 18:55:28.273385 env[1645]: time="2024-02-09T18:55:28.272569047Z" level=info msg="Start streaming server" Feb 9 18:55:28.273624 dbus-daemon[1622]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1680 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 18:55:28.278987 systemd[1]: Starting polkit.service... Feb 9 18:55:28.322879 env[1645]: time="2024-02-09T18:55:28.322770670Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 18:55:28.323237 polkitd[1736]: Started polkitd version 121 Feb 9 18:55:28.323674 env[1645]: time="2024-02-09T18:55:28.323649011Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 18:55:28.325559 env[1645]: time="2024-02-09T18:55:28.325531836Z" level=info msg="containerd successfully booted in 0.348445s" Feb 9 18:55:28.325616 systemd[1]: Started containerd.service. Feb 9 18:55:28.343640 polkitd[1736]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 18:55:28.343728 polkitd[1736]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 18:55:28.358585 polkitd[1736]: Finished loading, compiling and executing 2 rules Feb 9 18:55:28.359206 dbus-daemon[1622]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 18:55:28.359433 systemd[1]: Started polkit.service. Feb 9 18:55:28.364783 polkitd[1736]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 18:55:28.365452 tar[1638]: ./ptp Feb 9 18:55:28.383881 systemd-hostnamed[1680]: Hostname set to (transient) Feb 9 18:55:28.384122 systemd-resolved[1592]: System hostname changed to 'ip-172-31-20-217'. Feb 9 18:55:28.444092 coreos-metadata[1621]: Feb 09 18:55:28.443 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 9 18:55:28.451662 coreos-metadata[1621]: Feb 09 18:55:28.451 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 9 18:55:28.457492 coreos-metadata[1621]: Feb 09 18:55:28.457 INFO Fetch successful Feb 9 18:55:28.457677 coreos-metadata[1621]: Feb 09 18:55:28.457 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 9 18:55:28.459722 coreos-metadata[1621]: Feb 09 18:55:28.459 INFO Fetch successful Feb 9 18:55:28.465159 unknown[1621]: wrote ssh authorized keys file for user: core Feb 9 18:55:28.515778 update-ssh-keys[1771]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:55:28.516961 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 18:55:28.576196 tar[1638]: ./vlan Feb 9 18:55:28.690558 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Create new startup processor Feb 9 18:55:28.690947 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [LongRunningPluginsManager] registered plugins: {} Feb 9 18:55:28.691054 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Initializing bookkeeping folders Feb 9 18:55:28.691154 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO removing the completed state files Feb 9 18:55:28.691237 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Initializing bookkeeping folders for long running plugins Feb 9 18:55:28.691313 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 9 18:55:28.691397 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Initializing healthcheck folders for long running plugins Feb 9 18:55:28.691531 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Initializing locations for inventory plugin Feb 9 18:55:28.691720 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Initializing default location for custom inventory Feb 9 18:55:28.691816 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Initializing default location for file inventory Feb 9 18:55:28.691901 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Initializing default location for role inventory Feb 9 18:55:28.691981 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Init the cloudwatchlogs publisher Feb 9 18:55:28.692069 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Successfully loaded platform independent plugin aws:softwareInventory Feb 9 18:55:28.692156 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Successfully loaded platform independent plugin aws:configureDocker Feb 9 18:55:28.692324 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Successfully loaded platform independent plugin aws:refreshAssociation Feb 9 18:55:28.692412 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Successfully loaded platform independent plugin aws:runDocument Feb 9 18:55:28.692506 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 9 18:55:28.692591 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 9 18:55:28.692670 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Successfully loaded platform independent plugin aws:runDockerAction Feb 9 18:55:28.692749 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Successfully loaded platform independent plugin aws:configurePackage Feb 9 18:55:28.692827 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Successfully loaded platform independent plugin aws:downloadContent Feb 9 18:55:28.692902 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Successfully loaded platform dependent plugin aws:runShellScript Feb 9 18:55:28.693060 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 9 18:55:28.693159 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO OS: linux, Arch: amd64 Feb 9 18:55:28.694212 amazon-ssm-agent[1619]: datastore file /var/lib/amazon/ssm/i-04b1f2b2e179ceb0d/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 9 18:55:28.708367 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessagingDeliveryService] Starting document processing engine... Feb 9 18:55:28.759125 tar[1638]: ./host-device Feb 9 18:55:28.816867 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 9 18:55:28.912210 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 9 18:55:28.941647 tar[1638]: ./tuning Feb 9 18:55:29.006731 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessagingDeliveryService] Starting message polling Feb 9 18:55:29.045275 tar[1638]: ./vrf Feb 9 18:55:29.101519 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 9 18:55:29.143685 tar[1638]: ./sbr Feb 9 18:55:29.196418 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [instanceID=i-04b1f2b2e179ceb0d] Starting association polling Feb 9 18:55:29.242819 tar[1638]: ./tap Feb 9 18:55:29.291644 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 9 18:55:29.356165 tar[1638]: ./dhcp Feb 9 18:55:29.386885 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 9 18:55:29.482542 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 9 18:55:29.545958 systemd[1]: Finished prepare-critools.service. Feb 9 18:55:29.573973 tar[1638]: ./static Feb 9 18:55:29.578179 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 9 18:55:29.620246 tar[1638]: ./firewall Feb 9 18:55:29.674583 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 9 18:55:29.713069 tar[1638]: ./macvlan Feb 9 18:55:29.770034 tar[1638]: ./dummy Feb 9 18:55:29.770538 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [OfflineService] Starting document processing engine... Feb 9 18:55:29.840481 tar[1638]: ./bridge Feb 9 18:55:29.866816 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [OfflineService] [EngineProcessor] Starting Feb 9 18:55:29.922188 tar[1638]: ./ipvlan Feb 9 18:55:29.963375 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [OfflineService] [EngineProcessor] Initial processing Feb 9 18:55:29.989042 tar[1638]: ./portmap Feb 9 18:55:30.048793 tar[1638]: ./host-local Feb 9 18:55:30.060387 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [OfflineService] Starting message polling Feb 9 18:55:30.134307 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 18:55:30.157404 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [OfflineService] Starting send replies to MDS Feb 9 18:55:30.254450 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 9 18:55:30.263605 locksmithd[1709]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 18:55:30.353140 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 9 18:55:30.451427 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 18:55:30.551500 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessageGatewayService] Starting session document processing engine... Feb 9 18:55:30.571779 sshd_keygen[1644]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 18:55:30.623344 systemd[1]: Finished sshd-keygen.service. Feb 9 18:55:30.626615 systemd[1]: Starting issuegen.service... Feb 9 18:55:30.633228 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 18:55:30.633459 systemd[1]: Finished issuegen.service. Feb 9 18:55:30.636308 systemd[1]: Starting systemd-user-sessions.service... Feb 9 18:55:30.643444 systemd[1]: Finished systemd-user-sessions.service. Feb 9 18:55:30.646532 systemd[1]: Started getty@tty1.service. Feb 9 18:55:30.648926 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 18:55:30.650427 systemd[1]: Reached target getty.target. Feb 9 18:55:30.652390 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 9 18:55:30.651526 systemd[1]: Reached target multi-user.target. Feb 9 18:55:30.653984 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 18:55:30.663987 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 18:55:30.664164 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 18:55:30.665498 systemd[1]: Startup finished in 775ms (kernel) + 9.003s (initrd) + 12.851s (userspace) = 22.631s. Feb 9 18:55:30.749556 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 9 18:55:30.847858 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-04b1f2b2e179ceb0d, requestId: a5c1012f-1d11-4754-98ad-9faa60e27980 Feb 9 18:55:30.948805 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessageGatewayService] listening reply. Feb 9 18:55:31.049163 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 9 18:55:31.148188 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [StartupProcessor] Executing startup processor tasks Feb 9 18:55:31.249039 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 9 18:55:31.348262 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 9 18:55:31.447897 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 9 18:55:31.547690 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-04b1f2b2e179ceb0d?role=subscribe&stream=input Feb 9 18:55:31.649469 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-04b1f2b2e179ceb0d?role=subscribe&stream=input Feb 9 18:55:31.750024 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessageGatewayService] Starting receiving message from control channel Feb 9 18:55:31.851197 amazon-ssm-agent[1619]: 2024-02-09 18:55:28 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 9 18:55:32.734470 amazon-ssm-agent[1619]: 2024-02-09 18:55:32 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 9 18:55:36.439380 systemd[1]: Created slice system-sshd.slice. Feb 9 18:55:36.441016 systemd[1]: Started sshd@0-172.31.20.217:22-139.178.68.195:33266.service. Feb 9 18:55:36.690238 sshd[1834]: Accepted publickey for core from 139.178.68.195 port 33266 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:55:36.692490 sshd[1834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:36.716264 systemd[1]: Created slice user-500.slice. Feb 9 18:55:36.723384 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 18:55:36.727486 systemd-logind[1633]: New session 1 of user core. Feb 9 18:55:36.738206 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 18:55:36.740253 systemd[1]: Starting user@500.service... Feb 9 18:55:36.744954 (systemd)[1837]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:36.869189 systemd[1837]: Queued start job for default target default.target. Feb 9 18:55:36.869825 systemd[1837]: Reached target paths.target. Feb 9 18:55:36.869859 systemd[1837]: Reached target sockets.target. Feb 9 18:55:36.869879 systemd[1837]: Reached target timers.target. Feb 9 18:55:36.869897 systemd[1837]: Reached target basic.target. Feb 9 18:55:36.870029 systemd[1]: Started user@500.service. Feb 9 18:55:36.879263 systemd[1]: Started session-1.scope. Feb 9 18:55:36.879839 systemd[1837]: Reached target default.target. Feb 9 18:55:36.880151 systemd[1837]: Startup finished in 128ms. Feb 9 18:55:37.039546 systemd[1]: Started sshd@1-172.31.20.217:22-139.178.68.195:33274.service. Feb 9 18:55:37.199291 sshd[1846]: Accepted publickey for core from 139.178.68.195 port 33274 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:55:37.200922 sshd[1846]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:37.209924 systemd-logind[1633]: New session 2 of user core. Feb 9 18:55:37.210057 systemd[1]: Started session-2.scope. Feb 9 18:55:37.345572 sshd[1846]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:37.349140 systemd[1]: sshd@1-172.31.20.217:22-139.178.68.195:33274.service: Deactivated successfully. Feb 9 18:55:37.350248 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 18:55:37.350913 systemd-logind[1633]: Session 2 logged out. Waiting for processes to exit. Feb 9 18:55:37.352070 systemd-logind[1633]: Removed session 2. Feb 9 18:55:37.372783 systemd[1]: Started sshd@2-172.31.20.217:22-139.178.68.195:33276.service. Feb 9 18:55:37.544995 sshd[1852]: Accepted publickey for core from 139.178.68.195 port 33276 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:55:37.546452 sshd[1852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:37.555717 systemd-logind[1633]: New session 3 of user core. Feb 9 18:55:37.559637 systemd[1]: Started session-3.scope. Feb 9 18:55:37.686623 sshd[1852]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:37.689786 systemd[1]: sshd@2-172.31.20.217:22-139.178.68.195:33276.service: Deactivated successfully. Feb 9 18:55:37.690633 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 18:55:37.691408 systemd-logind[1633]: Session 3 logged out. Waiting for processes to exit. Feb 9 18:55:37.692410 systemd-logind[1633]: Removed session 3. Feb 9 18:55:37.712875 systemd[1]: Started sshd@3-172.31.20.217:22-139.178.68.195:33286.service. Feb 9 18:55:37.881949 sshd[1858]: Accepted publickey for core from 139.178.68.195 port 33286 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:55:37.885196 sshd[1858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:37.891475 systemd-logind[1633]: New session 4 of user core. Feb 9 18:55:37.891886 systemd[1]: Started session-4.scope. Feb 9 18:55:38.025956 sshd[1858]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:38.030617 systemd[1]: sshd@3-172.31.20.217:22-139.178.68.195:33286.service: Deactivated successfully. Feb 9 18:55:38.031660 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 18:55:38.032425 systemd-logind[1633]: Session 4 logged out. Waiting for processes to exit. Feb 9 18:55:38.033851 systemd-logind[1633]: Removed session 4. Feb 9 18:55:38.052961 systemd[1]: Started sshd@4-172.31.20.217:22-139.178.68.195:33288.service. Feb 9 18:55:38.232163 sshd[1864]: Accepted publickey for core from 139.178.68.195 port 33288 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:55:38.233974 sshd[1864]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:38.239563 systemd[1]: Started session-5.scope. Feb 9 18:55:38.240251 systemd-logind[1633]: New session 5 of user core. Feb 9 18:55:38.413739 sudo[1867]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 18:55:38.414547 sudo[1867]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:55:38.442626 dbus-daemon[1622]: \xd0\xcd\u0007^\u0017V: received setenforce notice (enforcing=2003743568) Feb 9 18:55:38.445367 sudo[1867]: pam_unix(sudo:session): session closed for user root Feb 9 18:55:38.476420 sshd[1864]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:38.486385 systemd[1]: sshd@4-172.31.20.217:22-139.178.68.195:33288.service: Deactivated successfully. Feb 9 18:55:38.489104 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 18:55:38.490438 systemd-logind[1633]: Session 5 logged out. Waiting for processes to exit. Feb 9 18:55:38.494058 systemd-logind[1633]: Removed session 5. Feb 9 18:55:38.505750 systemd[1]: Started sshd@5-172.31.20.217:22-139.178.68.195:33302.service. Feb 9 18:55:38.677208 sshd[1871]: Accepted publickey for core from 139.178.68.195 port 33302 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:55:38.678320 sshd[1871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:38.686571 systemd-logind[1633]: New session 6 of user core. Feb 9 18:55:38.688779 systemd[1]: Started session-6.scope. Feb 9 18:55:38.789593 sudo[1875]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 18:55:38.789889 sudo[1875]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:55:38.794381 sudo[1875]: pam_unix(sudo:session): session closed for user root Feb 9 18:55:38.801107 sudo[1874]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 18:55:38.801495 sudo[1874]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:55:38.812205 systemd[1]: Stopping audit-rules.service... Feb 9 18:55:38.813000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:55:38.814948 auditctl[1878]: No rules Feb 9 18:55:38.819145 kernel: kauditd_printk_skb: 190 callbacks suppressed Feb 9 18:55:38.819238 kernel: audit: type=1305 audit(1707504938.813:172): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:55:38.815651 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 18:55:38.815851 systemd[1]: Stopped audit-rules.service. Feb 9 18:55:38.813000 audit[1878]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcad1cc620 a2=420 a3=0 items=0 ppid=1 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:38.824712 systemd[1]: Starting audit-rules.service... Feb 9 18:55:38.828579 kernel: audit: type=1300 audit(1707504938.813:172): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcad1cc620 a2=420 a3=0 items=0 ppid=1 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:38.828683 kernel: audit: type=1327 audit(1707504938.813:172): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:55:38.813000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:55:38.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.836455 kernel: audit: type=1131 audit(1707504938.814:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.856831 augenrules[1895]: No rules Feb 9 18:55:38.857578 systemd[1]: Finished audit-rules.service. Feb 9 18:55:38.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.858893 sudo[1874]: pam_unix(sudo:session): session closed for user root Feb 9 18:55:38.857000 audit[1874]: USER_END pid=1874 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.868395 kernel: audit: type=1130 audit(1707504938.857:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.868601 kernel: audit: type=1106 audit(1707504938.857:175): pid=1874 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.868632 kernel: audit: type=1104 audit(1707504938.857:176): pid=1874 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.857000 audit[1874]: CRED_DISP pid=1874 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.886510 sshd[1871]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:38.888000 audit[1871]: USER_END pid=1871 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:38.891854 systemd[1]: sshd@5-172.31.20.217:22-139.178.68.195:33302.service: Deactivated successfully. Feb 9 18:55:38.896947 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 18:55:38.901994 systemd-logind[1633]: Session 6 logged out. Waiting for processes to exit. Feb 9 18:55:38.888000 audit[1871]: CRED_DISP pid=1871 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:38.903404 systemd-logind[1633]: Removed session 6. Feb 9 18:55:38.909970 kernel: audit: type=1106 audit(1707504938.888:177): pid=1871 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:38.910081 kernel: audit: type=1104 audit(1707504938.888:178): pid=1871 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:38.910140 kernel: audit: type=1131 audit(1707504938.888:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.20.217:22-139.178.68.195:33302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.20.217:22-139.178.68.195:33302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.217:22-139.178.68.195:33314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.920210 systemd[1]: Started sshd@6-172.31.20.217:22-139.178.68.195:33314.service. Feb 9 18:55:39.084000 audit[1901]: USER_ACCT pid=1901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:39.084864 sshd[1901]: Accepted publickey for core from 139.178.68.195 port 33314 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:55:39.085000 audit[1901]: CRED_ACQ pid=1901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:39.085000 audit[1901]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9186d10 a2=3 a3=0 items=0 ppid=1 pid=1901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.085000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:55:39.086815 sshd[1901]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:39.094586 systemd[1]: Started session-7.scope. Feb 9 18:55:39.095224 systemd-logind[1633]: New session 7 of user core. Feb 9 18:55:39.103000 audit[1901]: USER_START pid=1901 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:39.105000 audit[1903]: CRED_ACQ pid=1903 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:39.196000 audit[1904]: USER_ACCT pid=1904 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:39.198359 sudo[1904]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 18:55:39.197000 audit[1904]: CRED_REFR pid=1904 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:39.199143 sudo[1904]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:55:39.200000 audit[1904]: USER_START pid=1904 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:39.799320 systemd[1]: Reloading. Feb 9 18:55:39.972962 /usr/lib/systemd/system-generators/torcx-generator[1933]: time="2024-02-09T18:55:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:55:39.973001 /usr/lib/systemd/system-generators/torcx-generator[1933]: time="2024-02-09T18:55:39Z" level=info msg="torcx already run" Feb 9 18:55:40.123571 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:55:40.123593 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:55:40.156385 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:55:40.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit: BPF prog-id=40 op=LOAD Feb 9 18:55:40.278000 audit: BPF prog-id=32 op=UNLOAD Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit: BPF prog-id=41 op=LOAD Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.278000 audit: BPF prog-id=42 op=LOAD Feb 9 18:55:40.278000 audit: BPF prog-id=33 op=UNLOAD Feb 9 18:55:40.278000 audit: BPF prog-id=34 op=UNLOAD Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit: BPF prog-id=43 op=LOAD Feb 9 18:55:40.279000 audit: BPF prog-id=21 op=UNLOAD Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit: BPF prog-id=44 op=LOAD Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit: BPF prog-id=45 op=LOAD Feb 9 18:55:40.280000 audit: BPF prog-id=22 op=UNLOAD Feb 9 18:55:40.280000 audit: BPF prog-id=23 op=UNLOAD Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.281000 audit: BPF prog-id=46 op=LOAD Feb 9 18:55:40.281000 audit: BPF prog-id=26 op=UNLOAD Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit: BPF prog-id=47 op=LOAD Feb 9 18:55:40.287000 audit: BPF prog-id=27 op=UNLOAD Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit: BPF prog-id=48 op=LOAD Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.287000 audit: BPF prog-id=49 op=LOAD Feb 9 18:55:40.287000 audit: BPF prog-id=28 op=UNLOAD Feb 9 18:55:40.287000 audit: BPF prog-id=29 op=UNLOAD Feb 9 18:55:40.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.289000 audit: BPF prog-id=50 op=LOAD Feb 9 18:55:40.289000 audit: BPF prog-id=31 op=UNLOAD Feb 9 18:55:40.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.290000 audit: BPF prog-id=51 op=LOAD Feb 9 18:55:40.290000 audit: BPF prog-id=38 op=UNLOAD Feb 9 18:55:40.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit: BPF prog-id=52 op=LOAD Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.291000 audit: BPF prog-id=53 op=LOAD Feb 9 18:55:40.291000 audit: BPF prog-id=24 op=UNLOAD Feb 9 18:55:40.291000 audit: BPF prog-id=25 op=UNLOAD Feb 9 18:55:40.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.293000 audit: BPF prog-id=54 op=LOAD Feb 9 18:55:40.293000 audit: BPF prog-id=30 op=UNLOAD Feb 9 18:55:40.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit: BPF prog-id=55 op=LOAD Feb 9 18:55:40.296000 audit: BPF prog-id=35 op=UNLOAD Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit: BPF prog-id=56 op=LOAD Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:40.296000 audit: BPF prog-id=57 op=LOAD Feb 9 18:55:40.296000 audit: BPF prog-id=36 op=UNLOAD Feb 9 18:55:40.296000 audit: BPF prog-id=37 op=UNLOAD Feb 9 18:55:40.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:40.318857 systemd[1]: Started kubelet.service. Feb 9 18:55:40.345194 systemd[1]: Starting coreos-metadata.service... Feb 9 18:55:40.444926 kubelet[1985]: E0209 18:55:40.444791 1985 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 18:55:40.448064 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:55:40.448297 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:55:40.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:55:40.496136 coreos-metadata[1992]: Feb 09 18:55:40.495 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 9 18:55:40.497377 coreos-metadata[1992]: Feb 09 18:55:40.497 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Feb 9 18:55:40.498539 coreos-metadata[1992]: Feb 09 18:55:40.498 INFO Fetch successful Feb 9 18:55:40.498669 coreos-metadata[1992]: Feb 09 18:55:40.498 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Feb 9 18:55:40.499629 coreos-metadata[1992]: Feb 09 18:55:40.499 INFO Fetch successful Feb 9 18:55:40.499746 coreos-metadata[1992]: Feb 09 18:55:40.499 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Feb 9 18:55:40.500541 coreos-metadata[1992]: Feb 09 18:55:40.500 INFO Fetch successful Feb 9 18:55:40.500541 coreos-metadata[1992]: Feb 09 18:55:40.500 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Feb 9 18:55:40.501540 coreos-metadata[1992]: Feb 09 18:55:40.501 INFO Fetch successful Feb 9 18:55:40.501654 coreos-metadata[1992]: Feb 09 18:55:40.501 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Feb 9 18:55:40.502689 coreos-metadata[1992]: Feb 09 18:55:40.502 INFO Fetch successful Feb 9 18:55:40.502844 coreos-metadata[1992]: Feb 09 18:55:40.502 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Feb 9 18:55:40.503552 coreos-metadata[1992]: Feb 09 18:55:40.503 INFO Fetch successful Feb 9 18:55:40.503626 coreos-metadata[1992]: Feb 09 18:55:40.503 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Feb 9 18:55:40.504384 coreos-metadata[1992]: Feb 09 18:55:40.504 INFO Fetch successful Feb 9 18:55:40.504479 coreos-metadata[1992]: Feb 09 18:55:40.504 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Feb 9 18:55:40.505223 coreos-metadata[1992]: Feb 09 18:55:40.505 INFO Fetch successful Feb 9 18:55:40.518894 systemd[1]: Finished coreos-metadata.service. Feb 9 18:55:40.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.579300 systemd[1]: Stopped kubelet.service. Feb 9 18:55:41.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.608839 systemd[1]: Reloading. Feb 9 18:55:41.714257 /usr/lib/systemd/system-generators/torcx-generator[2048]: time="2024-02-09T18:55:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:55:41.722855 /usr/lib/systemd/system-generators/torcx-generator[2048]: time="2024-02-09T18:55:41Z" level=info msg="torcx already run" Feb 9 18:55:41.895685 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:55:41.897036 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:55:41.937033 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:55:42.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.111000 audit: BPF prog-id=58 op=LOAD Feb 9 18:55:42.111000 audit: BPF prog-id=40 op=UNLOAD Feb 9 18:55:42.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.113000 audit: BPF prog-id=59 op=LOAD Feb 9 18:55:42.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.116000 audit: BPF prog-id=60 op=LOAD Feb 9 18:55:42.116000 audit: BPF prog-id=41 op=UNLOAD Feb 9 18:55:42.116000 audit: BPF prog-id=42 op=UNLOAD Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit: BPF prog-id=61 op=LOAD Feb 9 18:55:42.117000 audit: BPF prog-id=43 op=UNLOAD Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit: BPF prog-id=62 op=LOAD Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit: BPF prog-id=63 op=LOAD Feb 9 18:55:42.118000 audit: BPF prog-id=44 op=UNLOAD Feb 9 18:55:42.118000 audit: BPF prog-id=45 op=UNLOAD Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.119000 audit: BPF prog-id=64 op=LOAD Feb 9 18:55:42.119000 audit: BPF prog-id=46 op=UNLOAD Feb 9 18:55:42.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit: BPF prog-id=65 op=LOAD Feb 9 18:55:42.128000 audit: BPF prog-id=47 op=UNLOAD Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit: BPF prog-id=66 op=LOAD Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.128000 audit: BPF prog-id=67 op=LOAD Feb 9 18:55:42.128000 audit: BPF prog-id=48 op=UNLOAD Feb 9 18:55:42.128000 audit: BPF prog-id=49 op=UNLOAD Feb 9 18:55:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.132000 audit: BPF prog-id=68 op=LOAD Feb 9 18:55:42.132000 audit: BPF prog-id=50 op=UNLOAD Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.133000 audit: BPF prog-id=69 op=LOAD Feb 9 18:55:42.133000 audit: BPF prog-id=51 op=UNLOAD Feb 9 18:55:42.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit: BPF prog-id=70 op=LOAD Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.134000 audit: BPF prog-id=71 op=LOAD Feb 9 18:55:42.134000 audit: BPF prog-id=52 op=UNLOAD Feb 9 18:55:42.134000 audit: BPF prog-id=53 op=UNLOAD Feb 9 18:55:42.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.136000 audit: BPF prog-id=72 op=LOAD Feb 9 18:55:42.136000 audit: BPF prog-id=54 op=UNLOAD Feb 9 18:55:42.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit: BPF prog-id=73 op=LOAD Feb 9 18:55:42.140000 audit: BPF prog-id=55 op=UNLOAD Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit: BPF prog-id=74 op=LOAD Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.140000 audit: BPF prog-id=75 op=LOAD Feb 9 18:55:42.140000 audit: BPF prog-id=56 op=UNLOAD Feb 9 18:55:42.140000 audit: BPF prog-id=57 op=UNLOAD Feb 9 18:55:42.170269 systemd[1]: Started kubelet.service. Feb 9 18:55:42.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:42.253509 kubelet[2101]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:55:42.253509 kubelet[2101]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 18:55:42.253509 kubelet[2101]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:55:42.254084 kubelet[2101]: I0209 18:55:42.253674 2101 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:55:42.782570 kubelet[2101]: I0209 18:55:42.782529 2101 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 18:55:42.782570 kubelet[2101]: I0209 18:55:42.782564 2101 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:55:42.782876 kubelet[2101]: I0209 18:55:42.782854 2101 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 18:55:42.785108 kubelet[2101]: I0209 18:55:42.785081 2101 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:55:42.787705 kubelet[2101]: I0209 18:55:42.787675 2101 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:55:42.788033 kubelet[2101]: I0209 18:55:42.788015 2101 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:55:42.788108 kubelet[2101]: I0209 18:55:42.788100 2101 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 18:55:42.788263 kubelet[2101]: I0209 18:55:42.788124 2101 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 18:55:42.788263 kubelet[2101]: I0209 18:55:42.788139 2101 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 18:55:42.788379 kubelet[2101]: I0209 18:55:42.788265 2101 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:55:42.799552 kubelet[2101]: I0209 18:55:42.799522 2101 kubelet.go:405] "Attempting to sync node with API server" Feb 9 18:55:42.799552 kubelet[2101]: I0209 18:55:42.799553 2101 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:55:42.799735 kubelet[2101]: I0209 18:55:42.799577 2101 kubelet.go:309] "Adding apiserver pod source" Feb 9 18:55:42.799735 kubelet[2101]: I0209 18:55:42.799595 2101 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:55:42.800551 kubelet[2101]: E0209 18:55:42.800526 2101 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:42.800676 kubelet[2101]: E0209 18:55:42.800526 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:42.800852 kubelet[2101]: I0209 18:55:42.800839 2101 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:55:42.801358 kubelet[2101]: W0209 18:55:42.801336 2101 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 18:55:42.801849 kubelet[2101]: I0209 18:55:42.801829 2101 server.go:1168] "Started kubelet" Feb 9 18:55:42.802132 kubelet[2101]: I0209 18:55:42.802118 2101 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:55:42.803982 kubelet[2101]: I0209 18:55:42.803964 2101 server.go:461] "Adding debug handlers to kubelet server" Feb 9 18:55:42.803000 audit[2101]: AVC avc: denied { mac_admin } for pid=2101 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.803000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:55:42.803000 audit[2101]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d975c0 a1=c00061b248 a2=c000d97590 a3=25 items=0 ppid=1 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.803000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:55:42.803000 audit[2101]: AVC avc: denied { mac_admin } for pid=2101 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.803000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:55:42.803000 audit[2101]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000157c00 a1=c00061b260 a2=c000d97650 a3=25 items=0 ppid=1 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.803000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:55:42.805728 kubelet[2101]: I0209 18:55:42.804858 2101 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:55:42.805728 kubelet[2101]: I0209 18:55:42.805305 2101 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:55:42.805728 kubelet[2101]: I0209 18:55:42.805411 2101 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:55:42.807823 kubelet[2101]: I0209 18:55:42.802141 2101 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 18:55:42.808922 kubelet[2101]: E0209 18:55:42.808903 2101 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:55:42.809089 kubelet[2101]: E0209 18:55:42.809076 2101 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:55:42.818252 kubelet[2101]: I0209 18:55:42.818210 2101 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 18:55:42.818662 kubelet[2101]: I0209 18:55:42.818640 2101 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 18:55:42.820049 kubelet[2101]: E0209 18:55:42.819840 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2dfeceb29", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 801808169, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 801808169, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:42.821187 kubelet[2101]: W0209 18:55:42.821145 2101 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.20.217" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:55:42.821187 kubelet[2101]: E0209 18:55:42.821176 2101 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.20.217" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:55:42.821308 kubelet[2101]: W0209 18:55:42.821225 2101 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:55:42.821308 kubelet[2101]: E0209 18:55:42.821239 2101 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:55:42.850833 kubelet[2101]: E0209 18:55:42.850788 2101 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.20.217\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 9 18:55:42.851146 kubelet[2101]: W0209 18:55:42.851127 2101 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:55:42.851412 kubelet[2101]: E0209 18:55:42.851269 2101 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:55:42.851638 kubelet[2101]: E0209 18:55:42.851554 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e05b96c9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 809061065, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 809061065, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:42.862302 kubelet[2101]: I0209 18:55:42.862280 2101 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:55:42.862919 kubelet[2101]: I0209 18:55:42.862476 2101 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:55:42.863060 kubelet[2101]: I0209 18:55:42.863046 2101 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:55:42.864204 kubelet[2101]: E0209 18:55:42.863956 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e3793645", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.20.217 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861334085, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861334085, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:42.866555 kubelet[2101]: E0209 18:55:42.866472 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e37999c7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.20.217 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861359559, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861359559, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:42.878000 audit[2114]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:42.878000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd03e8450 a2=0 a3=7fffd03e843c items=0 ppid=2101 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:55:42.880000 audit[2118]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:42.880000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc461c4750 a2=0 a3=7ffc461c473c items=0 ppid=2101 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:55:42.881810 kubelet[2101]: E0209 18:55:42.868545 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e379aa75", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.20.217 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861363829, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861363829, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:42.882178 kubelet[2101]: I0209 18:55:42.882146 2101 policy_none.go:49] "None policy: Start" Feb 9 18:55:42.883326 kubelet[2101]: I0209 18:55:42.883300 2101 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:55:42.883326 kubelet[2101]: I0209 18:55:42.883328 2101 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:55:42.891270 systemd[1]: Created slice kubepods.slice. Feb 9 18:55:42.883000 audit[2120]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:42.883000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcd8f9f900 a2=0 a3=7ffcd8f9f8ec items=0 ppid=2101 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:55:42.907634 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 18:55:42.911146 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 18:55:42.918000 audit[2126]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:42.918000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd9ac0d150 a2=0 a3=7ffd9ac0d13c items=0 ppid=2101 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:55:42.922190 kubelet[2101]: I0209 18:55:42.922161 2101 kubelet_node_status.go:70] "Attempting to register node" node="172.31.20.217" Feb 9 18:55:42.924453 kubelet[2101]: I0209 18:55:42.924425 2101 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:55:42.923000 audit[2101]: AVC avc: denied { mac_admin } for pid=2101 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.923000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:55:42.923000 audit[2101]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f0a420 a1=c000f0ca98 a2=c000f0a3f0 a3=25 items=0 ppid=1 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.923000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:55:42.924894 kubelet[2101]: I0209 18:55:42.924525 2101 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:55:42.924894 kubelet[2101]: I0209 18:55:42.924768 2101 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:55:42.928287 kubelet[2101]: E0209 18:55:42.928263 2101 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.20.217\" not found" Feb 9 18:55:42.931065 kubelet[2101]: E0209 18:55:42.931041 2101 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.20.217" Feb 9 18:55:42.931452 kubelet[2101]: E0209 18:55:42.931171 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e3793645", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.20.217 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861334085, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 922089633, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.20.217.17b246b2e3793645" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:42.935879 kubelet[2101]: E0209 18:55:42.935295 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e37999c7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.20.217 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861359559, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 922097914, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.20.217.17b246b2e37999c7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:42.940783 kubelet[2101]: E0209 18:55:42.940700 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e379aa75", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.20.217 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861363829, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 922101929, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.20.217.17b246b2e379aa75" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:42.946813 kubelet[2101]: E0209 18:55:42.946708 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e7691c08", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 927387656, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 927387656, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.053375 kubelet[2101]: E0209 18:55:43.053205 2101 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.20.217\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 9 18:55:43.062000 audit[2131]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.062000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffb64f6b60 a2=0 a3=7fffb64f6b4c items=0 ppid=2101 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 18:55:43.063732 kubelet[2101]: I0209 18:55:43.063695 2101 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 18:55:43.066000 audit[2132]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.066000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdca0f2f90 a2=0 a3=7ffdca0f2f7c items=0 ppid=2101 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.066000 audit[2133]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.066000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffee454770 a2=0 a3=7fffee45475c items=0 ppid=2101 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:55:43.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:55:43.068212 kubelet[2101]: I0209 18:55:43.068190 2101 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 18:55:43.068297 kubelet[2101]: I0209 18:55:43.068224 2101 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 18:55:43.068297 kubelet[2101]: I0209 18:55:43.068245 2101 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 18:55:43.068637 kubelet[2101]: E0209 18:55:43.068299 2101 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 18:55:43.075140 kubelet[2101]: W0209 18:55:43.075108 2101 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:55:43.075481 kubelet[2101]: E0209 18:55:43.075462 2101 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:55:43.077000 audit[2135]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.077000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfa4c9e80 a2=0 a3=7ffdfa4c9e6c items=0 ppid=2101 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:55:43.077000 audit[2134]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.077000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd5bf5a5b0 a2=0 a3=10e3 items=0 ppid=2101 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:55:43.081000 audit[2136]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.081000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc5df28a60 a2=0 a3=7ffc5df28a4c items=0 ppid=2101 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:55:43.082000 audit[2137]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.082000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff450ef5c0 a2=0 a3=7fff450ef5ac items=0 ppid=2101 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:55:43.083000 audit[2138]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.083000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffab65ba80 a2=0 a3=7fffab65ba6c items=0 ppid=2101 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:55:43.132115 kubelet[2101]: I0209 18:55:43.132079 2101 kubelet_node_status.go:70] "Attempting to register node" node="172.31.20.217" Feb 9 18:55:43.136285 kubelet[2101]: E0209 18:55:43.136252 2101 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.20.217" Feb 9 18:55:43.136562 kubelet[2101]: E0209 18:55:43.136482 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e3793645", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.20.217 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861334085, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 132043958, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.20.217.17b246b2e3793645" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.137948 kubelet[2101]: E0209 18:55:43.137873 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e37999c7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.20.217 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861359559, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 132049492, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.20.217.17b246b2e37999c7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.139181 kubelet[2101]: E0209 18:55:43.139118 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e379aa75", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.20.217 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861363829, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 132052330, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.20.217.17b246b2e379aa75" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.458567 kubelet[2101]: E0209 18:55:43.458450 2101 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.20.217\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 9 18:55:43.537870 kubelet[2101]: I0209 18:55:43.537834 2101 kubelet_node_status.go:70] "Attempting to register node" node="172.31.20.217" Feb 9 18:55:43.555090 kubelet[2101]: E0209 18:55:43.555055 2101 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.20.217" Feb 9 18:55:43.555279 kubelet[2101]: E0209 18:55:43.555161 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e3793645", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.20.217 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861334085, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 537790063, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.20.217.17b246b2e3793645" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.560274 kubelet[2101]: E0209 18:55:43.560173 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e37999c7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.20.217 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861359559, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 537801415, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.20.217.17b246b2e37999c7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.647609 kubelet[2101]: E0209 18:55:43.647501 2101 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217.17b246b2e379aa75", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.20.217", UID:"172.31.20.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.20.217 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.20.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 42, 861363829, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 537806092, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.20.217.17b246b2e379aa75" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.785204 kubelet[2101]: I0209 18:55:43.785151 2101 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 18:55:43.801634 kubelet[2101]: E0209 18:55:43.801591 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:44.219666 kubelet[2101]: E0209 18:55:44.219540 2101 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.20.217" not found Feb 9 18:55:44.269205 kubelet[2101]: E0209 18:55:44.269166 2101 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.20.217\" not found" node="172.31.20.217" Feb 9 18:55:44.357038 kubelet[2101]: I0209 18:55:44.356999 2101 kubelet_node_status.go:70] "Attempting to register node" node="172.31.20.217" Feb 9 18:55:44.362785 kubelet[2101]: I0209 18:55:44.362754 2101 kubelet_node_status.go:73] "Successfully registered node" node="172.31.20.217" Feb 9 18:55:44.477515 kubelet[2101]: I0209 18:55:44.477403 2101 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 18:55:44.478057 env[1645]: time="2024-02-09T18:55:44.478006549Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 18:55:44.478482 kubelet[2101]: I0209 18:55:44.478464 2101 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 18:55:44.712804 sudo[1904]: pam_unix(sudo:session): session closed for user root Feb 9 18:55:44.711000 audit[1904]: USER_END pid=1904 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:44.714899 kernel: kauditd_printk_skb: 477 callbacks suppressed Feb 9 18:55:44.714992 kernel: audit: type=1106 audit(1707504944.711:622): pid=1904 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:44.711000 audit[1904]: CRED_DISP pid=1904 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:44.724954 kernel: audit: type=1104 audit(1707504944.711:623): pid=1904 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:44.735573 sshd[1901]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:44.736000 audit[1901]: USER_END pid=1901 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:44.740867 systemd[1]: sshd@6-172.31.20.217:22-139.178.68.195:33314.service: Deactivated successfully. Feb 9 18:55:44.741772 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 18:55:44.744739 systemd-logind[1633]: Session 7 logged out. Waiting for processes to exit. Feb 9 18:55:44.736000 audit[1901]: CRED_DISP pid=1901 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:44.746231 systemd-logind[1633]: Removed session 7. Feb 9 18:55:44.751803 kernel: audit: type=1106 audit(1707504944.736:624): pid=1901 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:44.751880 kernel: audit: type=1104 audit(1707504944.736:625): pid=1901 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:44.751926 kernel: audit: type=1131 audit(1707504944.736:626): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.217:22-139.178.68.195:33314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:44.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.20.217:22-139.178.68.195:33314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:44.800984 kubelet[2101]: I0209 18:55:44.800939 2101 apiserver.go:52] "Watching apiserver" Feb 9 18:55:44.802035 kubelet[2101]: E0209 18:55:44.802010 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:44.810338 kubelet[2101]: I0209 18:55:44.810295 2101 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:44.810496 kubelet[2101]: I0209 18:55:44.810423 2101 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:44.810496 kubelet[2101]: I0209 18:55:44.810480 2101 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:44.811424 kubelet[2101]: E0209 18:55:44.811397 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:55:44.817684 systemd[1]: Created slice kubepods-besteffort-podcb7822af_ba86_4daf_9086_81e46758de47.slice. Feb 9 18:55:44.820483 kubelet[2101]: I0209 18:55:44.820444 2101 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 18:55:44.829989 systemd[1]: Created slice kubepods-besteffort-pod0e54545f_12c5_4f0a_9fa9_17045ebdc7a7.slice. Feb 9 18:55:44.835599 kubelet[2101]: I0209 18:55:44.835556 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-crhwp\" (UniqueName: \"kubernetes.io/projected/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-kube-api-access-crhwp\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.835758 kubelet[2101]: I0209 18:55:44.835609 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c32ad2c0-bb7a-48d0-bb08-cc11b911c484-kubelet-dir\") pod \"csi-node-driver-fnq7p\" (UID: \"c32ad2c0-bb7a-48d0-bb08-cc11b911c484\") " pod="calico-system/csi-node-driver-fnq7p" Feb 9 18:55:44.835758 kubelet[2101]: I0209 18:55:44.835640 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-75xq6\" (UniqueName: \"kubernetes.io/projected/c32ad2c0-bb7a-48d0-bb08-cc11b911c484-kube-api-access-75xq6\") pod \"csi-node-driver-fnq7p\" (UID: \"c32ad2c0-bb7a-48d0-bb08-cc11b911c484\") " pod="calico-system/csi-node-driver-fnq7p" Feb 9 18:55:44.835758 kubelet[2101]: I0209 18:55:44.835667 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cb7822af-ba86-4daf-9086-81e46758de47-lib-modules\") pod \"kube-proxy-9md86\" (UID: \"cb7822af-ba86-4daf-9086-81e46758de47\") " pod="kube-system/kube-proxy-9md86" Feb 9 18:55:44.835758 kubelet[2101]: I0209 18:55:44.835698 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cb7822af-ba86-4daf-9086-81e46758de47-kube-proxy\") pod \"kube-proxy-9md86\" (UID: \"cb7822af-ba86-4daf-9086-81e46758de47\") " pod="kube-system/kube-proxy-9md86" Feb 9 18:55:44.835758 kubelet[2101]: I0209 18:55:44.835725 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-xtables-lock\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.835976 kubelet[2101]: I0209 18:55:44.835757 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-tigera-ca-bundle\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.835976 kubelet[2101]: I0209 18:55:44.835787 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-var-lib-calico\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.835976 kubelet[2101]: I0209 18:55:44.835823 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-cni-bin-dir\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.835976 kubelet[2101]: I0209 18:55:44.835858 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c32ad2c0-bb7a-48d0-bb08-cc11b911c484-socket-dir\") pod \"csi-node-driver-fnq7p\" (UID: \"c32ad2c0-bb7a-48d0-bb08-cc11b911c484\") " pod="calico-system/csi-node-driver-fnq7p" Feb 9 18:55:44.835976 kubelet[2101]: I0209 18:55:44.835913 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-lib-modules\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.836283 kubelet[2101]: I0209 18:55:44.835945 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-flexvol-driver-host\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.836283 kubelet[2101]: I0209 18:55:44.835979 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r276c\" (UniqueName: \"kubernetes.io/projected/cb7822af-ba86-4daf-9086-81e46758de47-kube-api-access-r276c\") pod \"kube-proxy-9md86\" (UID: \"cb7822af-ba86-4daf-9086-81e46758de47\") " pod="kube-system/kube-proxy-9md86" Feb 9 18:55:44.836283 kubelet[2101]: I0209 18:55:44.836009 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c32ad2c0-bb7a-48d0-bb08-cc11b911c484-varrun\") pod \"csi-node-driver-fnq7p\" (UID: \"c32ad2c0-bb7a-48d0-bb08-cc11b911c484\") " pod="calico-system/csi-node-driver-fnq7p" Feb 9 18:55:44.836283 kubelet[2101]: I0209 18:55:44.836043 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c32ad2c0-bb7a-48d0-bb08-cc11b911c484-registration-dir\") pod \"csi-node-driver-fnq7p\" (UID: \"c32ad2c0-bb7a-48d0-bb08-cc11b911c484\") " pod="calico-system/csi-node-driver-fnq7p" Feb 9 18:55:44.836283 kubelet[2101]: I0209 18:55:44.836074 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cb7822af-ba86-4daf-9086-81e46758de47-xtables-lock\") pod \"kube-proxy-9md86\" (UID: \"cb7822af-ba86-4daf-9086-81e46758de47\") " pod="kube-system/kube-proxy-9md86" Feb 9 18:55:44.836547 kubelet[2101]: I0209 18:55:44.836104 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-policysync\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.836547 kubelet[2101]: I0209 18:55:44.836269 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-node-certs\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.836547 kubelet[2101]: I0209 18:55:44.836306 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-var-run-calico\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.836547 kubelet[2101]: I0209 18:55:44.836367 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-cni-net-dir\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.836547 kubelet[2101]: I0209 18:55:44.836401 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0e54545f-12c5-4f0a-9fa9-17045ebdc7a7-cni-log-dir\") pod \"calico-node-l5hj5\" (UID: \"0e54545f-12c5-4f0a-9fa9-17045ebdc7a7\") " pod="calico-system/calico-node-l5hj5" Feb 9 18:55:44.836547 kubelet[2101]: I0209 18:55:44.836413 2101 reconciler.go:41] "Reconciler: start to sync state" Feb 9 18:55:44.942025 kubelet[2101]: E0209 18:55:44.941994 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.942025 kubelet[2101]: W0209 18:55:44.942021 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.942284 kubelet[2101]: E0209 18:55:44.942043 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.942284 kubelet[2101]: E0209 18:55:44.942240 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.942284 kubelet[2101]: W0209 18:55:44.942250 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.942284 kubelet[2101]: E0209 18:55:44.942268 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.942551 kubelet[2101]: E0209 18:55:44.942536 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.942551 kubelet[2101]: W0209 18:55:44.942551 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.942679 kubelet[2101]: E0209 18:55:44.942568 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.942763 kubelet[2101]: E0209 18:55:44.942750 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.942830 kubelet[2101]: W0209 18:55:44.942765 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.942830 kubelet[2101]: E0209 18:55:44.942780 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.943491 kubelet[2101]: E0209 18:55:44.943445 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.943608 kubelet[2101]: W0209 18:55:44.943492 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.943608 kubelet[2101]: E0209 18:55:44.943510 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.943858 kubelet[2101]: E0209 18:55:44.943839 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.943858 kubelet[2101]: W0209 18:55:44.943857 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.944106 kubelet[2101]: E0209 18:55:44.943874 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.945773 kubelet[2101]: E0209 18:55:44.945757 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.946053 kubelet[2101]: W0209 18:55:44.945959 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.946223 kubelet[2101]: E0209 18:55:44.946199 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.946964 kubelet[2101]: E0209 18:55:44.946944 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.946964 kubelet[2101]: W0209 18:55:44.946959 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.947136 kubelet[2101]: E0209 18:55:44.947127 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.947506 kubelet[2101]: E0209 18:55:44.947413 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.947506 kubelet[2101]: W0209 18:55:44.947428 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.947783 kubelet[2101]: E0209 18:55:44.947767 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.947882 kubelet[2101]: E0209 18:55:44.947799 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.948075 kubelet[2101]: W0209 18:55:44.947884 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.948263 kubelet[2101]: E0209 18:55:44.948247 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.948391 kubelet[2101]: W0209 18:55:44.948267 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.948449 kubelet[2101]: E0209 18:55:44.948249 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.948449 kubelet[2101]: E0209 18:55:44.948442 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.948672 kubelet[2101]: E0209 18:55:44.948664 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.948771 kubelet[2101]: W0209 18:55:44.948674 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.948935 kubelet[2101]: E0209 18:55:44.948818 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.949560 kubelet[2101]: E0209 18:55:44.949536 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.949560 kubelet[2101]: W0209 18:55:44.949549 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.949673 kubelet[2101]: E0209 18:55:44.949646 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.949801 kubelet[2101]: E0209 18:55:44.949784 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.949801 kubelet[2101]: W0209 18:55:44.949797 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.951795 kubelet[2101]: E0209 18:55:44.950327 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.952018 kubelet[2101]: E0209 18:55:44.951990 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.952018 kubelet[2101]: W0209 18:55:44.952003 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.952478 kubelet[2101]: E0209 18:55:44.952457 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.953051 kubelet[2101]: E0209 18:55:44.953032 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.953051 kubelet[2101]: W0209 18:55:44.953046 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.953514 kubelet[2101]: E0209 18:55:44.953477 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.953722 kubelet[2101]: E0209 18:55:44.953705 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.953722 kubelet[2101]: W0209 18:55:44.953721 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.954102 kubelet[2101]: E0209 18:55:44.954045 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.954102 kubelet[2101]: W0209 18:55:44.954061 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.954402 kubelet[2101]: E0209 18:55:44.954386 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.954402 kubelet[2101]: W0209 18:55:44.954402 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.954705 kubelet[2101]: E0209 18:55:44.954689 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.954705 kubelet[2101]: W0209 18:55:44.954706 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.954893 kubelet[2101]: E0209 18:55:44.954881 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.954960 kubelet[2101]: W0209 18:55:44.954894 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.955072 kubelet[2101]: E0209 18:55:44.955060 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.955127 kubelet[2101]: W0209 18:55:44.955074 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.955251 kubelet[2101]: E0209 18:55:44.955239 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.955306 kubelet[2101]: W0209 18:55:44.955253 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.955463 kubelet[2101]: E0209 18:55:44.955450 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.955636 kubelet[2101]: W0209 18:55:44.955465 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.955776 kubelet[2101]: E0209 18:55:44.955761 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.955835 kubelet[2101]: W0209 18:55:44.955778 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.956009 kubelet[2101]: E0209 18:55:44.955993 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.956009 kubelet[2101]: W0209 18:55:44.956009 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.956282 kubelet[2101]: E0209 18:55:44.956002 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.956387 kubelet[2101]: E0209 18:55:44.956376 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.956448 kubelet[2101]: E0209 18:55:44.956317 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.956673 kubelet[2101]: E0209 18:55:44.956509 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.956788 kubelet[2101]: E0209 18:55:44.956333 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.956788 kubelet[2101]: E0209 18:55:44.956365 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.957221 kubelet[2101]: W0209 18:55:44.956665 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.957974 kubelet[2101]: E0209 18:55:44.957960 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.958580 kubelet[2101]: W0209 18:55:44.958561 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.958879 kubelet[2101]: E0209 18:55:44.958867 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.959003 kubelet[2101]: W0209 18:55:44.958954 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.959086 kubelet[2101]: E0209 18:55:44.956453 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.959086 kubelet[2101]: E0209 18:55:44.956464 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.959086 kubelet[2101]: E0209 18:55:44.956477 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.959086 kubelet[2101]: E0209 18:55:44.956486 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.959377 kubelet[2101]: E0209 18:55:44.956497 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.959377 kubelet[2101]: E0209 18:55:44.959019 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.959377 kubelet[2101]: E0209 18:55:44.959031 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.959564 kubelet[2101]: E0209 18:55:44.959401 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.959564 kubelet[2101]: W0209 18:55:44.959412 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.959668 kubelet[2101]: E0209 18:55:44.959628 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.959668 kubelet[2101]: W0209 18:55:44.959637 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.959829 kubelet[2101]: E0209 18:55:44.959814 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.959887 kubelet[2101]: W0209 18:55:44.959830 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.960017 kubelet[2101]: E0209 18:55:44.960003 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.960082 kubelet[2101]: W0209 18:55:44.960018 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.960255 kubelet[2101]: E0209 18:55:44.960240 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.960331 kubelet[2101]: E0209 18:55:44.960319 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.960416 kubelet[2101]: E0209 18:55:44.960375 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.960478 kubelet[2101]: E0209 18:55:44.960289 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.960526 kubelet[2101]: W0209 18:55:44.960483 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.960673 kubelet[2101]: E0209 18:55:44.960301 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.960762 kubelet[2101]: E0209 18:55:44.960310 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.960762 kubelet[2101]: E0209 18:55:44.960668 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.960904 kubelet[2101]: W0209 18:55:44.960769 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.960970 kubelet[2101]: E0209 18:55:44.960681 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.961077 kubelet[2101]: E0209 18:55:44.960997 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.961077 kubelet[2101]: W0209 18:55:44.961073 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.961224 kubelet[2101]: E0209 18:55:44.961009 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.961301 kubelet[2101]: E0209 18:55:44.961288 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.961375 kubelet[2101]: W0209 18:55:44.961303 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.961459 kubelet[2101]: E0209 18:55:44.961447 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.961538 kubelet[2101]: E0209 18:55:44.961526 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.961601 kubelet[2101]: W0209 18:55:44.961540 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.961688 kubelet[2101]: E0209 18:55:44.961678 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.961771 kubelet[2101]: E0209 18:55:44.961715 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.961830 kubelet[2101]: W0209 18:55:44.961817 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.961892 kubelet[2101]: E0209 18:55:44.961726 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.961941 kubelet[2101]: E0209 18:55:44.961908 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.962171 kubelet[2101]: E0209 18:55:44.962154 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.962171 kubelet[2101]: W0209 18:55:44.962167 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.962306 kubelet[2101]: E0209 18:55:44.962285 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.962598 kubelet[2101]: E0209 18:55:44.962580 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.962598 kubelet[2101]: W0209 18:55:44.962594 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.962709 kubelet[2101]: E0209 18:55:44.962686 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.962857 kubelet[2101]: E0209 18:55:44.962841 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.962857 kubelet[2101]: W0209 18:55:44.962853 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.963005 kubelet[2101]: E0209 18:55:44.962993 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.963087 kubelet[2101]: E0209 18:55:44.963038 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.963143 kubelet[2101]: W0209 18:55:44.963089 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.963239 kubelet[2101]: E0209 18:55:44.963227 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.963320 kubelet[2101]: E0209 18:55:44.963273 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.963386 kubelet[2101]: W0209 18:55:44.963376 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.963784 kubelet[2101]: E0209 18:55:44.963766 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.964566 kubelet[2101]: E0209 18:55:44.964552 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.964662 kubelet[2101]: W0209 18:55:44.964649 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.964870 kubelet[2101]: E0209 18:55:44.964849 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.965068 kubelet[2101]: E0209 18:55:44.965051 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.965133 kubelet[2101]: W0209 18:55:44.965069 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.965180 kubelet[2101]: E0209 18:55:44.965149 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.966208 kubelet[2101]: E0209 18:55:44.966190 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.966208 kubelet[2101]: W0209 18:55:44.966207 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.966616 kubelet[2101]: E0209 18:55:44.966598 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.966732 kubelet[2101]: W0209 18:55:44.966616 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.969533 kubelet[2101]: E0209 18:55:44.969514 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.969533 kubelet[2101]: W0209 18:55:44.969533 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.977791 kubelet[2101]: E0209 18:55:44.977760 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.978125 kubelet[2101]: E0209 18:55:44.978102 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.978268 kubelet[2101]: E0209 18:55:44.978248 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.978448 kubelet[2101]: E0209 18:55:44.978429 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.978448 kubelet[2101]: W0209 18:55:44.978444 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.978733 kubelet[2101]: E0209 18:55:44.978718 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.979104 kubelet[2101]: E0209 18:55:44.979080 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.979104 kubelet[2101]: W0209 18:55:44.979099 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.979263 kubelet[2101]: E0209 18:55:44.979204 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.979671 kubelet[2101]: E0209 18:55:44.979657 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.979788 kubelet[2101]: W0209 18:55:44.979774 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.980397 kubelet[2101]: E0209 18:55:44.980336 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.980690 kubelet[2101]: E0209 18:55:44.980678 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.980784 kubelet[2101]: W0209 18:55:44.980770 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.980982 kubelet[2101]: E0209 18:55:44.980941 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.981239 kubelet[2101]: E0209 18:55:44.981227 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.981326 kubelet[2101]: W0209 18:55:44.981314 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.981526 kubelet[2101]: E0209 18:55:44.981515 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.981812 kubelet[2101]: E0209 18:55:44.981800 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.981913 kubelet[2101]: W0209 18:55:44.981899 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.982083 kubelet[2101]: E0209 18:55:44.982073 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.982317 kubelet[2101]: E0209 18:55:44.982307 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.982437 kubelet[2101]: W0209 18:55:44.982425 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.982768 kubelet[2101]: E0209 18:55:44.982753 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.983446 kubelet[2101]: E0209 18:55:44.983433 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.983544 kubelet[2101]: W0209 18:55:44.983532 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.983727 kubelet[2101]: E0209 18:55:44.983716 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:44.984058 kubelet[2101]: E0209 18:55:44.984047 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:44.984146 kubelet[2101]: W0209 18:55:44.984134 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:44.984219 kubelet[2101]: E0209 18:55:44.984210 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:45.000374 kubelet[2101]: E0209 18:55:44.997918 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:45.000374 kubelet[2101]: W0209 18:55:44.997939 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:45.000374 kubelet[2101]: E0209 18:55:44.998047 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:45.024512 kubelet[2101]: E0209 18:55:45.024484 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:45.024741 kubelet[2101]: W0209 18:55:45.024705 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:45.024928 kubelet[2101]: E0209 18:55:45.024915 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:45.025585 kubelet[2101]: E0209 18:55:45.025565 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:45.025585 kubelet[2101]: W0209 18:55:45.025579 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:45.025697 kubelet[2101]: E0209 18:55:45.025601 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:45.133014 env[1645]: time="2024-02-09T18:55:45.132779014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9md86,Uid:cb7822af-ba86-4daf-9086-81e46758de47,Namespace:kube-system,Attempt:0,}" Feb 9 18:55:45.136742 env[1645]: time="2024-02-09T18:55:45.136691422Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-l5hj5,Uid:0e54545f-12c5-4f0a-9fa9-17045ebdc7a7,Namespace:calico-system,Attempt:0,}" Feb 9 18:55:45.773873 env[1645]: time="2024-02-09T18:55:45.773825004Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:45.775536 env[1645]: time="2024-02-09T18:55:45.775475434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:45.785115 env[1645]: time="2024-02-09T18:55:45.784967358Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:45.786469 env[1645]: time="2024-02-09T18:55:45.786431075Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:45.787702 env[1645]: time="2024-02-09T18:55:45.787671620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:45.794209 env[1645]: time="2024-02-09T18:55:45.794166301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:45.795228 env[1645]: time="2024-02-09T18:55:45.795191127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:45.797268 env[1645]: time="2024-02-09T18:55:45.797236945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:45.802860 kubelet[2101]: E0209 18:55:45.802830 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:45.830088 env[1645]: time="2024-02-09T18:55:45.826489283Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:45.830088 env[1645]: time="2024-02-09T18:55:45.826537023Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:45.830088 env[1645]: time="2024-02-09T18:55:45.826553114Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:45.830088 env[1645]: time="2024-02-09T18:55:45.826696837Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0df6bbfdfc771ed9c1c78853c5d22fa68603b06e446833025ad80cda5333d815 pid=2214 runtime=io.containerd.runc.v2 Feb 9 18:55:45.830392 env[1645]: time="2024-02-09T18:55:45.829721832Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:45.830392 env[1645]: time="2024-02-09T18:55:45.829753020Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:45.830392 env[1645]: time="2024-02-09T18:55:45.829763386Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:45.830756 env[1645]: time="2024-02-09T18:55:45.829915752Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1edcf42f80ad1ab26c29296a1462e4226f2c0b811049b93baaffd0a1b37afbe0 pid=2227 runtime=io.containerd.runc.v2 Feb 9 18:55:45.856644 systemd[1]: Started cri-containerd-0df6bbfdfc771ed9c1c78853c5d22fa68603b06e446833025ad80cda5333d815.scope. Feb 9 18:55:45.858651 systemd[1]: Started cri-containerd-1edcf42f80ad1ab26c29296a1462e4226f2c0b811049b93baaffd0a1b37afbe0.scope. Feb 9 18:55:45.894817 kernel: audit: type=1400 audit(1707504945.885:627): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.894933 kernel: audit: type=1400 audit(1707504945.885:628): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.921498 kernel: audit: type=1400 audit(1707504945.885:629): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.921599 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 18:55:45.921630 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 18:55:45.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.894000 audit: BPF prog-id=76 op=LOAD Feb 9 18:55:45.901000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.901000 audit[2241]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2214 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:45.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064663662626664666337373165643963316337383835336335643232 Feb 9 18:55:45.901000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.901000 audit[2241]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2214 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:45.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064663662626664666337373165643963316337383835336335643232 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit: BPF prog-id=77 op=LOAD Feb 9 18:55:45.902000 audit[2241]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8040 items=0 ppid=2214 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:45.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064663662626664666337373165643963316337383835336335643232 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit: BPF prog-id=78 op=LOAD Feb 9 18:55:45.902000 audit[2241]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8088 items=0 ppid=2214 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:45.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064663662626664666337373165643963316337383835336335643232 Feb 9 18:55:45.902000 audit: BPF prog-id=78 op=UNLOAD Feb 9 18:55:45.902000 audit: BPF prog-id=77 op=UNLOAD Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.902000 audit: BPF prog-id=79 op=LOAD Feb 9 18:55:45.902000 audit[2241]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c8498 items=0 ppid=2214 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:45.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064663662626664666337373165643963316337383835336335643232 Feb 9 18:55:45.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:45.983330 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount441977910.mount: Deactivated successfully. Feb 9 18:55:45.990093 env[1645]: time="2024-02-09T18:55:45.990035183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9md86,Uid:cb7822af-ba86-4daf-9086-81e46758de47,Namespace:kube-system,Attempt:0,} returns sandbox id \"0df6bbfdfc771ed9c1c78853c5d22fa68603b06e446833025ad80cda5333d815\"" Feb 9 18:55:45.999119 env[1645]: time="2024-02-09T18:55:45.999037385Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 18:55:46.000644 env[1645]: time="2024-02-09T18:55:46.000600271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-l5hj5,Uid:0e54545f-12c5-4f0a-9fa9-17045ebdc7a7,Namespace:calico-system,Attempt:0,} returns sandbox id \"1edcf42f80ad1ab26c29296a1462e4226f2c0b811049b93baaffd0a1b37afbe0\"" Feb 9 18:55:46.069545 kubelet[2101]: E0209 18:55:46.069138 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:55:46.803767 kubelet[2101]: E0209 18:55:46.803722 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:47.418603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount995301398.mount: Deactivated successfully. Feb 9 18:55:47.804691 kubelet[2101]: E0209 18:55:47.804588 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:48.069699 kubelet[2101]: E0209 18:55:48.069536 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:55:48.170610 env[1645]: time="2024-02-09T18:55:48.170555811Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:48.174142 env[1645]: time="2024-02-09T18:55:48.174101859Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:48.180411 env[1645]: time="2024-02-09T18:55:48.180374241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:48.181714 env[1645]: time="2024-02-09T18:55:48.181689100Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:48.182523 env[1645]: time="2024-02-09T18:55:48.182436057Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 18:55:48.184023 env[1645]: time="2024-02-09T18:55:48.183992644Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 18:55:48.185230 env[1645]: time="2024-02-09T18:55:48.185199265Z" level=info msg="CreateContainer within sandbox \"0df6bbfdfc771ed9c1c78853c5d22fa68603b06e446833025ad80cda5333d815\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 18:55:48.209470 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1169563847.mount: Deactivated successfully. Feb 9 18:55:48.219073 env[1645]: time="2024-02-09T18:55:48.219020114Z" level=info msg="CreateContainer within sandbox \"0df6bbfdfc771ed9c1c78853c5d22fa68603b06e446833025ad80cda5333d815\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c31574e738dd069b479227f6c82a1ed8a4ccdbba393d7d78c371302510f9dffc\"" Feb 9 18:55:48.220306 env[1645]: time="2024-02-09T18:55:48.220267590Z" level=info msg="StartContainer for \"c31574e738dd069b479227f6c82a1ed8a4ccdbba393d7d78c371302510f9dffc\"" Feb 9 18:55:48.257059 systemd[1]: Started cri-containerd-c31574e738dd069b479227f6c82a1ed8a4ccdbba393d7d78c371302510f9dffc.scope. Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2214 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313537346537333864643036396234373932323766366338326131 Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.282000 audit: BPF prog-id=84 op=LOAD Feb 9 18:55:48.282000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028c1f0 items=0 ppid=2214 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313537346537333864643036396234373932323766366338326131 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit: BPF prog-id=85 op=LOAD Feb 9 18:55:48.283000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028c238 items=0 ppid=2214 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313537346537333864643036396234373932323766366338326131 Feb 9 18:55:48.283000 audit: BPF prog-id=85 op=UNLOAD Feb 9 18:55:48.283000 audit: BPF prog-id=84 op=UNLOAD Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:48.283000 audit: BPF prog-id=86 op=LOAD Feb 9 18:55:48.283000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028c2c8 items=0 ppid=2214 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313537346537333864643036396234373932323766366338326131 Feb 9 18:55:48.308707 env[1645]: time="2024-02-09T18:55:48.308654592Z" level=info msg="StartContainer for \"c31574e738dd069b479227f6c82a1ed8a4ccdbba393d7d78c371302510f9dffc\" returns successfully" Feb 9 18:55:48.441000 audit[2343]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.442000 audit[2342]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.442000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3aab98b0 a2=0 a3=31030 items=0 ppid=2305 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:55:48.441000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd5848920 a2=0 a3=7fffd584890c items=0 ppid=2305 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:55:48.446000 audit[2344]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.446000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb146a7a0 a2=0 a3=7ffeb146a78c items=0 ppid=2305 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:55:48.447000 audit[2345]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.447000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff82dd8e0 a2=0 a3=7ffff82dd8cc items=0 ppid=2305 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:55:48.448000 audit[2346]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.448000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9179e170 a2=0 a3=7fff9179e15c items=0 ppid=2305 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:55:48.449000 audit[2347]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.449000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5ba177d0 a2=0 a3=7ffe5ba177bc items=0 ppid=2305 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:55:48.541000 audit[2348]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.541000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff062931a0 a2=0 a3=7fff0629318c items=0 ppid=2305 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:55:48.545000 audit[2350]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.545000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc57271ed0 a2=0 a3=7ffc57271ebc items=0 ppid=2305 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 18:55:48.549000 audit[2353]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.549000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe16739190 a2=0 a3=7ffe1673917c items=0 ppid=2305 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.549000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 18:55:48.550000 audit[2354]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.550000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffab7bd5c0 a2=0 a3=7fffab7bd5ac items=0 ppid=2305 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:55:48.554000 audit[2356]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.554000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd1766ad0 a2=0 a3=7fffd1766abc items=0 ppid=2305 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:55:48.555000 audit[2357]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.555000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd50f72350 a2=0 a3=7ffd50f7233c items=0 ppid=2305 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:55:48.558000 audit[2359]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.558000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe921f4880 a2=0 a3=7ffe921f486c items=0 ppid=2305 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:55:48.564000 audit[2362]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.564000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc7c98ccb0 a2=0 a3=7ffc7c98cc9c items=0 ppid=2305 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 18:55:48.565000 audit[2363]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.565000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5faf2ed0 a2=0 a3=7fff5faf2ebc items=0 ppid=2305 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:55:48.568000 audit[2365]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.568000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3c001c00 a2=0 a3=7ffd3c001bec items=0 ppid=2305 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:55:48.569000 audit[2366]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.569000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6c679990 a2=0 a3=7ffe6c67997c items=0 ppid=2305 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:55:48.572000 audit[2368]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.572000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc03934380 a2=0 a3=7ffc0393436c items=0 ppid=2305 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:55:48.576000 audit[2371]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.576000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe91b69620 a2=0 a3=7ffe91b6960c items=0 ppid=2305 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:55:48.580000 audit[2374]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.580000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccf3d2db0 a2=0 a3=7ffccf3d2d9c items=0 ppid=2305 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:55:48.582000 audit[2375]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.582000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffda82add20 a2=0 a3=7ffda82add0c items=0 ppid=2305 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:55:48.586000 audit[2377]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.586000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffece0173b0 a2=0 a3=7ffece01739c items=0 ppid=2305 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:55:48.615000 audit[2382]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.615000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd310d8bd0 a2=0 a3=7ffd310d8bbc items=0 ppid=2305 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:55:48.623000 audit[2387]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.623000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd27d9fe00 a2=0 a3=7ffd27d9fdec items=0 ppid=2305 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:55:48.627000 audit[2389]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:48.627000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd2f5957b0 a2=0 a3=7ffd2f59579c items=0 ppid=2305 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:55:48.634000 audit[2391]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:48.634000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffebbf458e0 a2=0 a3=7ffebbf458cc items=0 ppid=2305 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:48.677000 audit[2391]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:48.677000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffebbf458e0 a2=0 a3=7ffebbf458cc items=0 ppid=2305 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:48.702000 audit[2399]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.702000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffd0efbff0 a2=0 a3=7fffd0efbfdc items=0 ppid=2305 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:55:48.713000 audit[2401]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.713000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc8b3aa4b0 a2=0 a3=7ffc8b3aa49c items=0 ppid=2305 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 18:55:48.721000 audit[2404]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.721000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffde6243bc0 a2=0 a3=7ffde6243bac items=0 ppid=2305 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.721000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 18:55:48.724000 audit[2405]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.724000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffecd22db30 a2=0 a3=7ffecd22db1c items=0 ppid=2305 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:55:48.730000 audit[2407]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.730000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb2879e20 a2=0 a3=7ffcb2879e0c items=0 ppid=2305 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:55:48.732000 audit[2408]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.732000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed20ef390 a2=0 a3=7ffed20ef37c items=0 ppid=2305 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:55:48.736000 audit[2410]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.736000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc063e1240 a2=0 a3=7ffc063e122c items=0 ppid=2305 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 18:55:48.745000 audit[2413]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.745000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe25446c00 a2=0 a3=7ffe25446bec items=0 ppid=2305 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:55:48.747000 audit[2414]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.747000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5a78ed40 a2=0 a3=7ffc5a78ed2c items=0 ppid=2305 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:55:48.752000 audit[2416]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.752000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff7e46eaf0 a2=0 a3=7fff7e46eadc items=0 ppid=2305 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:55:48.753000 audit[2417]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.753000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe896447c0 a2=0 a3=7ffe896447ac items=0 ppid=2305 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:55:48.757000 audit[2419]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.757000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb84043e0 a2=0 a3=7ffdb84043cc items=0 ppid=2305 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:55:48.762000 audit[2422]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.762000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd600babe0 a2=0 a3=7ffd600babcc items=0 ppid=2305 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:55:48.768000 audit[2425]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.768000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee01a8f80 a2=0 a3=7ffee01a8f6c items=0 ppid=2305 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 18:55:48.770000 audit[2426]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.770000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc5363c720 a2=0 a3=7ffc5363c70c items=0 ppid=2305 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:55:48.773000 audit[2428]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.773000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe7a9d9d30 a2=0 a3=7ffe7a9d9d1c items=0 ppid=2305 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:55:48.778000 audit[2431]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.778000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc6fb9b6a0 a2=0 a3=7ffc6fb9b68c items=0 ppid=2305 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.778000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:55:48.780000 audit[2432]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.780000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbbcde720 a2=0 a3=7fffbbcde70c items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:55:48.785000 audit[2434]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.785000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd49fa0240 a2=0 a3=7ffd49fa022c items=0 ppid=2305 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:55:48.791000 audit[2437]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.791000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdadab2c70 a2=0 a3=7ffdadab2c5c items=0 ppid=2305 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:55:48.792000 audit[2438]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.792000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc16c26fc0 a2=0 a3=7ffc16c26fac items=0 ppid=2305 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.792000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:55:48.800000 audit[2440]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:48.800000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcffb30c40 a2=0 a3=7ffcffb30c2c items=0 ppid=2305 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.800000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:55:48.805512 kubelet[2101]: E0209 18:55:48.805427 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:48.805000 audit[2443]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:55:48.805000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd358430c0 a2=0 a3=7ffd358430ac items=0 ppid=2305 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.805000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:48.806000 audit[2443]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:55:48.806000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd358430c0 a2=0 a3=7ffd358430ac items=0 ppid=2305 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:48.806000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:49.100762 kubelet[2101]: I0209 18:55:49.100730 2101 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-9md86" podStartSLOduration=2.915443391 podCreationTimestamp="2024-02-09 18:55:44 +0000 UTC" firstStartedPulling="2024-02-09 18:55:45.997728309 +0000 UTC m=+3.814585932" lastFinishedPulling="2024-02-09 18:55:48.182966999 +0000 UTC m=+5.999824627" observedRunningTime="2024-02-09 18:55:49.10047731 +0000 UTC m=+6.917334954" watchObservedRunningTime="2024-02-09 18:55:49.100682086 +0000 UTC m=+6.917539731" Feb 9 18:55:49.151659 kubelet[2101]: E0209 18:55:49.151586 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.151845 kubelet[2101]: W0209 18:55:49.151812 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.151930 kubelet[2101]: E0209 18:55:49.151862 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.152140 kubelet[2101]: E0209 18:55:49.152122 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.152140 kubelet[2101]: W0209 18:55:49.152136 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.152302 kubelet[2101]: E0209 18:55:49.152156 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.152438 kubelet[2101]: E0209 18:55:49.152421 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.152495 kubelet[2101]: W0209 18:55:49.152444 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.152495 kubelet[2101]: E0209 18:55:49.152460 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.152820 kubelet[2101]: E0209 18:55:49.152799 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.152820 kubelet[2101]: W0209 18:55:49.152813 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.152974 kubelet[2101]: E0209 18:55:49.152830 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.153059 kubelet[2101]: E0209 18:55:49.153040 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.153059 kubelet[2101]: W0209 18:55:49.153054 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.153180 kubelet[2101]: E0209 18:55:49.153069 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.156315 kubelet[2101]: E0209 18:55:49.153634 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.156315 kubelet[2101]: W0209 18:55:49.156315 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.156506 kubelet[2101]: E0209 18:55:49.156338 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.156869 kubelet[2101]: E0209 18:55:49.156850 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.156869 kubelet[2101]: W0209 18:55:49.156864 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.156988 kubelet[2101]: E0209 18:55:49.156882 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.157489 kubelet[2101]: E0209 18:55:49.157457 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.157489 kubelet[2101]: W0209 18:55:49.157488 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.157648 kubelet[2101]: E0209 18:55:49.157509 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.157795 kubelet[2101]: E0209 18:55:49.157764 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.157795 kubelet[2101]: W0209 18:55:49.157783 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.157907 kubelet[2101]: E0209 18:55:49.157799 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.158306 kubelet[2101]: E0209 18:55:49.158284 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.158411 kubelet[2101]: W0209 18:55:49.158306 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.158411 kubelet[2101]: E0209 18:55:49.158323 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.158586 kubelet[2101]: E0209 18:55:49.158565 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.158651 kubelet[2101]: W0209 18:55:49.158587 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.158651 kubelet[2101]: E0209 18:55:49.158602 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.159677 kubelet[2101]: E0209 18:55:49.159593 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.160320 kubelet[2101]: W0209 18:55:49.160216 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.160431 kubelet[2101]: E0209 18:55:49.160323 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.160703 kubelet[2101]: E0209 18:55:49.160685 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.160703 kubelet[2101]: W0209 18:55:49.160699 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.160817 kubelet[2101]: E0209 18:55:49.160725 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.161623 kubelet[2101]: E0209 18:55:49.161366 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.161713 kubelet[2101]: W0209 18:55:49.161630 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.161713 kubelet[2101]: E0209 18:55:49.161649 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.161912 kubelet[2101]: E0209 18:55:49.161848 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.161978 kubelet[2101]: W0209 18:55:49.161914 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.161978 kubelet[2101]: E0209 18:55:49.161929 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.162143 kubelet[2101]: E0209 18:55:49.162128 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.162143 kubelet[2101]: W0209 18:55:49.162142 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.162227 kubelet[2101]: E0209 18:55:49.162157 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.193464 kubelet[2101]: E0209 18:55:49.193432 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.193464 kubelet[2101]: W0209 18:55:49.193455 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.193693 kubelet[2101]: E0209 18:55:49.193486 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.193880 kubelet[2101]: E0209 18:55:49.193789 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.193880 kubelet[2101]: W0209 18:55:49.193878 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.194001 kubelet[2101]: E0209 18:55:49.193902 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.194404 kubelet[2101]: E0209 18:55:49.194309 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.194404 kubelet[2101]: W0209 18:55:49.194398 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.194553 kubelet[2101]: E0209 18:55:49.194423 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.194708 kubelet[2101]: E0209 18:55:49.194691 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.194708 kubelet[2101]: W0209 18:55:49.194704 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.194827 kubelet[2101]: E0209 18:55:49.194726 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.195119 kubelet[2101]: E0209 18:55:49.195100 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.195119 kubelet[2101]: W0209 18:55:49.195114 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.195428 kubelet[2101]: E0209 18:55:49.195215 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.195647 kubelet[2101]: E0209 18:55:49.195623 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.195647 kubelet[2101]: W0209 18:55:49.195641 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.195769 kubelet[2101]: E0209 18:55:49.195664 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.195997 kubelet[2101]: E0209 18:55:49.195979 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.195997 kubelet[2101]: W0209 18:55:49.195993 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.196113 kubelet[2101]: E0209 18:55:49.196013 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.196264 kubelet[2101]: E0209 18:55:49.196247 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.196264 kubelet[2101]: W0209 18:55:49.196260 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.196387 kubelet[2101]: E0209 18:55:49.196281 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.196703 kubelet[2101]: E0209 18:55:49.196686 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.196703 kubelet[2101]: W0209 18:55:49.196699 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.196858 kubelet[2101]: E0209 18:55:49.196842 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.196942 kubelet[2101]: E0209 18:55:49.196929 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.196990 kubelet[2101]: W0209 18:55:49.196944 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.196990 kubelet[2101]: E0209 18:55:49.196960 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.197403 kubelet[2101]: E0209 18:55:49.197385 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.197403 kubelet[2101]: W0209 18:55:49.197398 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.197721 kubelet[2101]: E0209 18:55:49.197420 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.197824 kubelet[2101]: E0209 18:55:49.197802 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:49.197824 kubelet[2101]: W0209 18:55:49.197817 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:49.197905 kubelet[2101]: E0209 18:55:49.197834 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:49.485116 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1683022636.mount: Deactivated successfully. Feb 9 18:55:49.805788 kubelet[2101]: E0209 18:55:49.805721 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:50.068838 kubelet[2101]: E0209 18:55:50.068500 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:55:50.171153 kubelet[2101]: E0209 18:55:50.171120 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.171153 kubelet[2101]: W0209 18:55:50.171143 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.190957 kubelet[2101]: E0209 18:55:50.171168 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.190957 kubelet[2101]: E0209 18:55:50.171646 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.190957 kubelet[2101]: W0209 18:55:50.171661 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.190957 kubelet[2101]: E0209 18:55:50.171676 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.190957 kubelet[2101]: E0209 18:55:50.172660 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.190957 kubelet[2101]: W0209 18:55:50.172670 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.190957 kubelet[2101]: E0209 18:55:50.172715 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.190957 kubelet[2101]: E0209 18:55:50.175327 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.190957 kubelet[2101]: W0209 18:55:50.175354 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.190957 kubelet[2101]: E0209 18:55:50.175385 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.196541 kubelet[2101]: E0209 18:55:50.175705 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.196541 kubelet[2101]: W0209 18:55:50.175717 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.196541 kubelet[2101]: E0209 18:55:50.175736 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.196541 kubelet[2101]: E0209 18:55:50.176229 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.196541 kubelet[2101]: W0209 18:55:50.176243 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.196541 kubelet[2101]: E0209 18:55:50.176261 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.196541 kubelet[2101]: E0209 18:55:50.176648 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.196541 kubelet[2101]: W0209 18:55:50.176658 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.196541 kubelet[2101]: E0209 18:55:50.176674 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.196541 kubelet[2101]: E0209 18:55:50.179048 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.196962 kubelet[2101]: W0209 18:55:50.179062 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.196962 kubelet[2101]: E0209 18:55:50.179080 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.196962 kubelet[2101]: E0209 18:55:50.179438 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.196962 kubelet[2101]: W0209 18:55:50.179498 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.196962 kubelet[2101]: E0209 18:55:50.179517 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.196962 kubelet[2101]: E0209 18:55:50.180594 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.196962 kubelet[2101]: W0209 18:55:50.180609 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.196962 kubelet[2101]: E0209 18:55:50.180662 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.196962 kubelet[2101]: E0209 18:55:50.181897 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.196962 kubelet[2101]: W0209 18:55:50.181910 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.198122 kubelet[2101]: E0209 18:55:50.181928 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.198122 kubelet[2101]: E0209 18:55:50.182791 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.198122 kubelet[2101]: W0209 18:55:50.182807 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.198122 kubelet[2101]: E0209 18:55:50.182821 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.198122 kubelet[2101]: E0209 18:55:50.183983 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.198122 kubelet[2101]: W0209 18:55:50.183996 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.198122 kubelet[2101]: E0209 18:55:50.184023 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.198122 kubelet[2101]: E0209 18:55:50.188448 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.198122 kubelet[2101]: W0209 18:55:50.188479 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.198122 kubelet[2101]: E0209 18:55:50.188505 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.198532 kubelet[2101]: E0209 18:55:50.196359 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.198532 kubelet[2101]: W0209 18:55:50.196384 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.198532 kubelet[2101]: E0209 18:55:50.196415 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.198532 kubelet[2101]: E0209 18:55:50.196730 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.198532 kubelet[2101]: W0209 18:55:50.196742 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.198532 kubelet[2101]: E0209 18:55:50.196760 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.202245 kubelet[2101]: E0209 18:55:50.202219 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.202532 kubelet[2101]: W0209 18:55:50.202471 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.202643 kubelet[2101]: E0209 18:55:50.202630 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.203073 kubelet[2101]: E0209 18:55:50.203059 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.203674 kubelet[2101]: W0209 18:55:50.203140 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.203674 kubelet[2101]: E0209 18:55:50.203160 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.203674 kubelet[2101]: E0209 18:55:50.203467 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.203674 kubelet[2101]: W0209 18:55:50.203479 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.203674 kubelet[2101]: E0209 18:55:50.203504 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.203953 kubelet[2101]: E0209 18:55:50.203935 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.203953 kubelet[2101]: W0209 18:55:50.203949 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.204079 kubelet[2101]: E0209 18:55:50.203971 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.204285 kubelet[2101]: E0209 18:55:50.204267 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.204285 kubelet[2101]: W0209 18:55:50.204280 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.204443 kubelet[2101]: E0209 18:55:50.204301 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.205118 kubelet[2101]: E0209 18:55:50.205099 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.205118 kubelet[2101]: W0209 18:55:50.205114 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.205284 kubelet[2101]: E0209 18:55:50.205262 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.205824 kubelet[2101]: E0209 18:55:50.205799 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.205898 kubelet[2101]: W0209 18:55:50.205845 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.205898 kubelet[2101]: E0209 18:55:50.205870 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.206533 kubelet[2101]: E0209 18:55:50.206515 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.206533 kubelet[2101]: W0209 18:55:50.206529 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.206766 kubelet[2101]: E0209 18:55:50.206551 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.207190 kubelet[2101]: E0209 18:55:50.207171 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.207190 kubelet[2101]: W0209 18:55:50.207186 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.207335 kubelet[2101]: E0209 18:55:50.207313 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.207522 kubelet[2101]: E0209 18:55:50.207506 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.207582 kubelet[2101]: W0209 18:55:50.207539 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.207582 kubelet[2101]: E0209 18:55:50.207562 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.208250 kubelet[2101]: E0209 18:55:50.208231 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.208250 kubelet[2101]: W0209 18:55:50.208246 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.208384 kubelet[2101]: E0209 18:55:50.208263 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.212958 kubelet[2101]: E0209 18:55:50.212921 2101 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:50.212958 kubelet[2101]: W0209 18:55:50.212942 2101 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:50.212958 kubelet[2101]: E0209 18:55:50.212966 2101 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:50.691117 env[1645]: time="2024-02-09T18:55:50.691057097Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:50.695251 env[1645]: time="2024-02-09T18:55:50.695187510Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:50.698048 env[1645]: time="2024-02-09T18:55:50.698006443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:50.700824 env[1645]: time="2024-02-09T18:55:50.700786551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:50.702001 env[1645]: time="2024-02-09T18:55:50.701890228Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 18:55:50.704331 env[1645]: time="2024-02-09T18:55:50.704299283Z" level=info msg="CreateContainer within sandbox \"1edcf42f80ad1ab26c29296a1462e4226f2c0b811049b93baaffd0a1b37afbe0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 18:55:50.742718 env[1645]: time="2024-02-09T18:55:50.742650925Z" level=info msg="CreateContainer within sandbox \"1edcf42f80ad1ab26c29296a1462e4226f2c0b811049b93baaffd0a1b37afbe0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"458de328c343bf94ca9cdb15d28fa3630d6d16d769f2a5211b95d9442102dd7e\"" Feb 9 18:55:50.747297 env[1645]: time="2024-02-09T18:55:50.747252336Z" level=info msg="StartContainer for \"458de328c343bf94ca9cdb15d28fa3630d6d16d769f2a5211b95d9442102dd7e\"" Feb 9 18:55:50.791146 systemd[1]: run-containerd-runc-k8s.io-458de328c343bf94ca9cdb15d28fa3630d6d16d769f2a5211b95d9442102dd7e-runc.qUQM0f.mount: Deactivated successfully. Feb 9 18:55:50.796039 systemd[1]: Started cri-containerd-458de328c343bf94ca9cdb15d28fa3630d6d16d769f2a5211b95d9442102dd7e.scope. Feb 9 18:55:50.805936 kubelet[2101]: E0209 18:55:50.805902 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:50.815376 kernel: kauditd_printk_skb: 375 callbacks suppressed Feb 9 18:55:50.815496 kernel: audit: type=1400 audit(1707504950.812:709): avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.812000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.812000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2227 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:50.825478 kernel: audit: type=1300 audit(1707504950.812:709): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2227 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:50.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435386465333238633334336266393463613963646231356432386661 Feb 9 18:55:50.831404 kernel: audit: type=1327 audit(1707504950.812:709): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435386465333238633334336266393463613963646231356432386661 Feb 9 18:55:50.814000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.836045 kernel: audit: type=1400 audit(1707504950.814:710): avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.836149 kernel: audit: type=1400 audit(1707504950.814:710): avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.814000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.841519 kernel: audit: type=1400 audit(1707504950.814:710): avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.814000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.855028 kernel: audit: type=1400 audit(1707504950.814:710): avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.814000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.814000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.860358 kernel: audit: type=1400 audit(1707504950.814:710): avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.814000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.874660 kernel: audit: type=1400 audit(1707504950.814:710): avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.874763 kernel: audit: type=1400 audit(1707504950.814:710): avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.814000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.814000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.814000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.814000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.814000 audit: BPF prog-id=87 op=LOAD Feb 9 18:55:50.814000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003b24c0 items=0 ppid=2227 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:50.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435386465333238633334336266393463613963646231356432386661 Feb 9 18:55:50.818000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.818000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.818000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.818000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.818000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.818000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.818000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.818000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.818000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.818000 audit: BPF prog-id=88 op=LOAD Feb 9 18:55:50.818000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003b2508 items=0 ppid=2227 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:50.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435386465333238633334336266393463613963646231356432386661 Feb 9 18:55:50.830000 audit: BPF prog-id=88 op=UNLOAD Feb 9 18:55:50.830000 audit: BPF prog-id=87 op=UNLOAD Feb 9 18:55:50.830000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.830000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.830000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.830000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.830000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.830000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.830000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.830000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.830000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.830000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:50.830000 audit: BPF prog-id=89 op=LOAD Feb 9 18:55:50.830000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003b2598 items=0 ppid=2227 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:50.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435386465333238633334336266393463613963646231356432386661 Feb 9 18:55:50.905559 env[1645]: time="2024-02-09T18:55:50.905412922Z" level=info msg="StartContainer for \"458de328c343bf94ca9cdb15d28fa3630d6d16d769f2a5211b95d9442102dd7e\" returns successfully" Feb 9 18:55:50.914710 systemd[1]: cri-containerd-458de328c343bf94ca9cdb15d28fa3630d6d16d769f2a5211b95d9442102dd7e.scope: Deactivated successfully. Feb 9 18:55:50.918000 audit: BPF prog-id=89 op=UNLOAD Feb 9 18:55:51.648953 env[1645]: time="2024-02-09T18:55:51.648876376Z" level=info msg="shim disconnected" id=458de328c343bf94ca9cdb15d28fa3630d6d16d769f2a5211b95d9442102dd7e Feb 9 18:55:51.648953 env[1645]: time="2024-02-09T18:55:51.648945590Z" level=warning msg="cleaning up after shim disconnected" id=458de328c343bf94ca9cdb15d28fa3630d6d16d769f2a5211b95d9442102dd7e namespace=k8s.io Feb 9 18:55:51.648953 env[1645]: time="2024-02-09T18:55:51.648960357Z" level=info msg="cleaning up dead shim" Feb 9 18:55:51.661558 env[1645]: time="2024-02-09T18:55:51.661510678Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:55:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2551 runtime=io.containerd.runc.v2\n" Feb 9 18:55:51.728340 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-458de328c343bf94ca9cdb15d28fa3630d6d16d769f2a5211b95d9442102dd7e-rootfs.mount: Deactivated successfully. Feb 9 18:55:51.806134 kubelet[2101]: E0209 18:55:51.806093 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:52.069553 kubelet[2101]: E0209 18:55:52.069498 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:55:52.100214 env[1645]: time="2024-02-09T18:55:52.100167396Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 18:55:52.807177 kubelet[2101]: E0209 18:55:52.807119 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:53.391614 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2581147397.mount: Deactivated successfully. Feb 9 18:55:53.808361 kubelet[2101]: E0209 18:55:53.808296 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:54.069291 kubelet[2101]: E0209 18:55:54.069160 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:55:54.808602 kubelet[2101]: E0209 18:55:54.808562 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:55.809700 kubelet[2101]: E0209 18:55:55.809471 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:56.075814 kubelet[2101]: E0209 18:55:56.071492 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:55:56.810208 kubelet[2101]: E0209 18:55:56.810134 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:57.810386 kubelet[2101]: E0209 18:55:57.810301 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:58.069548 kubelet[2101]: E0209 18:55:58.068846 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:55:58.417328 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 18:55:58.433255 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 18:55:58.433489 kernel: audit: type=1131 audit(1707504958.416:716): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:58.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:58.445000 audit: BPF prog-id=75 op=UNLOAD Feb 9 18:55:58.445000 audit: BPF prog-id=74 op=UNLOAD Feb 9 18:55:58.450756 kernel: audit: type=1334 audit(1707504958.445:717): prog-id=75 op=UNLOAD Feb 9 18:55:58.450845 kernel: audit: type=1334 audit(1707504958.445:718): prog-id=74 op=UNLOAD Feb 9 18:55:58.450875 kernel: audit: type=1334 audit(1707504958.445:719): prog-id=73 op=UNLOAD Feb 9 18:55:58.445000 audit: BPF prog-id=73 op=UNLOAD Feb 9 18:55:58.614198 env[1645]: time="2024-02-09T18:55:58.614112758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:58.617770 env[1645]: time="2024-02-09T18:55:58.617729182Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:58.621115 env[1645]: time="2024-02-09T18:55:58.621075059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:58.623773 env[1645]: time="2024-02-09T18:55:58.623689926Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:58.624899 env[1645]: time="2024-02-09T18:55:58.624867374Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 18:55:58.627579 env[1645]: time="2024-02-09T18:55:58.627546583Z" level=info msg="CreateContainer within sandbox \"1edcf42f80ad1ab26c29296a1462e4226f2c0b811049b93baaffd0a1b37afbe0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 18:55:58.651047 env[1645]: time="2024-02-09T18:55:58.650990493Z" level=info msg="CreateContainer within sandbox \"1edcf42f80ad1ab26c29296a1462e4226f2c0b811049b93baaffd0a1b37afbe0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ed188135232f17eb10e270b5310dffe1ad7175160109c18fdb859e0bf8435696\"" Feb 9 18:55:58.653004 env[1645]: time="2024-02-09T18:55:58.652947200Z" level=info msg="StartContainer for \"ed188135232f17eb10e270b5310dffe1ad7175160109c18fdb859e0bf8435696\"" Feb 9 18:55:58.680049 systemd[1]: Started cri-containerd-ed188135232f17eb10e270b5310dffe1ad7175160109c18fdb859e0bf8435696.scope. Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.730654 kernel: audit: type=1400 audit(1707504958.722:720): avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.722000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2227 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:58.739542 kernel: audit: type=1300 audit(1707504958.722:720): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2227 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:58.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564313838313335323332663137656231306532373062353331306466 Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.756972 kernel: audit: type=1327 audit(1707504958.722:720): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564313838313335323332663137656231306532373062353331306466 Feb 9 18:55:58.757096 kernel: audit: type=1400 audit(1707504958.722:721): avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.757133 kernel: audit: type=1400 audit(1707504958.722:721): avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.766391 kernel: audit: type=1400 audit(1707504958.722:721): avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.774806 env[1645]: time="2024-02-09T18:55:58.774647204Z" level=info msg="StartContainer for \"ed188135232f17eb10e270b5310dffe1ad7175160109c18fdb859e0bf8435696\" returns successfully" Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.722000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.722000 audit: BPF prog-id=90 op=LOAD Feb 9 18:55:58.722000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000259b20 items=0 ppid=2227 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:58.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564313838313335323332663137656231306532373062353331306466 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit: BPF prog-id=91 op=LOAD Feb 9 18:55:58.723000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000259b68 items=0 ppid=2227 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:58.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564313838313335323332663137656231306532373062353331306466 Feb 9 18:55:58.723000 audit: BPF prog-id=91 op=UNLOAD Feb 9 18:55:58.723000 audit: BPF prog-id=90 op=UNLOAD Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:58.723000 audit: BPF prog-id=92 op=LOAD Feb 9 18:55:58.723000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000259bf8 items=0 ppid=2227 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:58.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564313838313335323332663137656231306532373062353331306466 Feb 9 18:55:58.810725 kubelet[2101]: E0209 18:55:58.810636 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:59.811038 kubelet[2101]: E0209 18:55:59.810959 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:00.068990 kubelet[2101]: E0209 18:56:00.068866 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:56:00.811971 kubelet[2101]: E0209 18:56:00.811918 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:01.432363 env[1645]: time="2024-02-09T18:56:01.432270474Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:56:01.437177 systemd[1]: cri-containerd-ed188135232f17eb10e270b5310dffe1ad7175160109c18fdb859e0bf8435696.scope: Deactivated successfully. Feb 9 18:56:01.442000 audit: BPF prog-id=92 op=UNLOAD Feb 9 18:56:01.512376 kubelet[2101]: I0209 18:56:01.510379 2101 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 18:56:01.518052 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ed188135232f17eb10e270b5310dffe1ad7175160109c18fdb859e0bf8435696-rootfs.mount: Deactivated successfully. Feb 9 18:56:01.813044 kubelet[2101]: E0209 18:56:01.813004 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:02.096230 systemd[1]: Created slice kubepods-besteffort-podc32ad2c0_bb7a_48d0_bb08_cc11b911c484.slice. Feb 9 18:56:02.105954 env[1645]: time="2024-02-09T18:56:02.105907895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fnq7p,Uid:c32ad2c0-bb7a-48d0-bb08-cc11b911c484,Namespace:calico-system,Attempt:0,}" Feb 9 18:56:02.553634 env[1645]: time="2024-02-09T18:56:02.553432972Z" level=error msg="Failed to destroy network for sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:02.555908 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a-shm.mount: Deactivated successfully. Feb 9 18:56:02.557580 env[1645]: time="2024-02-09T18:56:02.557522059Z" level=error msg="encountered an error cleaning up failed sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:02.557746 env[1645]: time="2024-02-09T18:56:02.557611882Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fnq7p,Uid:c32ad2c0-bb7a-48d0-bb08-cc11b911c484,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:02.558240 kubelet[2101]: E0209 18:56:02.558132 2101 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:02.558407 kubelet[2101]: E0209 18:56:02.558286 2101 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fnq7p" Feb 9 18:56:02.558407 kubelet[2101]: E0209 18:56:02.558332 2101 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fnq7p" Feb 9 18:56:02.558639 kubelet[2101]: E0209 18:56:02.558462 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-fnq7p_calico-system(c32ad2c0-bb7a-48d0-bb08-cc11b911c484)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-fnq7p_calico-system(c32ad2c0-bb7a-48d0-bb08-cc11b911c484)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:56:02.764577 amazon-ssm-agent[1619]: 2024-02-09 18:56:02 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 9 18:56:02.800463 kubelet[2101]: E0209 18:56:02.800271 2101 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:02.814124 kubelet[2101]: E0209 18:56:02.813410 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:03.147077 kubelet[2101]: I0209 18:56:03.146964 2101 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:03.148853 env[1645]: time="2024-02-09T18:56:03.148809554Z" level=info msg="StopPodSandbox for \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\"" Feb 9 18:56:03.172635 env[1645]: time="2024-02-09T18:56:03.172578563Z" level=info msg="shim disconnected" id=ed188135232f17eb10e270b5310dffe1ad7175160109c18fdb859e0bf8435696 Feb 9 18:56:03.172635 env[1645]: time="2024-02-09T18:56:03.172636017Z" level=warning msg="cleaning up after shim disconnected" id=ed188135232f17eb10e270b5310dffe1ad7175160109c18fdb859e0bf8435696 namespace=k8s.io Feb 9 18:56:03.172856 env[1645]: time="2024-02-09T18:56:03.172647374Z" level=info msg="cleaning up dead shim" Feb 9 18:56:03.190605 env[1645]: time="2024-02-09T18:56:03.190537866Z" level=error msg="StopPodSandbox for \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\" failed" error="failed to destroy network for sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:03.191021 kubelet[2101]: E0209 18:56:03.190930 2101 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:03.191215 kubelet[2101]: E0209 18:56:03.191063 2101 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a} Feb 9 18:56:03.191215 kubelet[2101]: E0209 18:56:03.191112 2101 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c32ad2c0-bb7a-48d0-bb08-cc11b911c484\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:56:03.191215 kubelet[2101]: E0209 18:56:03.191149 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c32ad2c0-bb7a-48d0-bb08-cc11b911c484\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fnq7p" podUID=c32ad2c0-bb7a-48d0-bb08-cc11b911c484 Feb 9 18:56:03.194092 env[1645]: time="2024-02-09T18:56:03.194055737Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:56:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2668 runtime=io.containerd.runc.v2\n" Feb 9 18:56:03.814198 kubelet[2101]: E0209 18:56:03.814144 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:04.156303 env[1645]: time="2024-02-09T18:56:04.155725728Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 18:56:04.814893 kubelet[2101]: E0209 18:56:04.814850 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:04.847328 kubelet[2101]: I0209 18:56:04.847288 2101 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:56:04.857023 systemd[1]: Created slice kubepods-besteffort-pod98410015_68b6_4dca_814c_0201b00b91f4.slice. Feb 9 18:56:05.010141 kubelet[2101]: I0209 18:56:05.010101 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rdpxx\" (UniqueName: \"kubernetes.io/projected/98410015-68b6-4dca-814c-0201b00b91f4-kube-api-access-rdpxx\") pod \"nginx-deployment-845c78c8b9-lds2q\" (UID: \"98410015-68b6-4dca-814c-0201b00b91f4\") " pod="default/nginx-deployment-845c78c8b9-lds2q" Feb 9 18:56:05.166172 env[1645]: time="2024-02-09T18:56:05.165620023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-lds2q,Uid:98410015-68b6-4dca-814c-0201b00b91f4,Namespace:default,Attempt:0,}" Feb 9 18:56:05.317395 env[1645]: time="2024-02-09T18:56:05.316374712Z" level=error msg="Failed to destroy network for sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:05.319248 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d-shm.mount: Deactivated successfully. Feb 9 18:56:05.320094 env[1645]: time="2024-02-09T18:56:05.320035330Z" level=error msg="encountered an error cleaning up failed sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:05.320531 env[1645]: time="2024-02-09T18:56:05.320271899Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-lds2q,Uid:98410015-68b6-4dca-814c-0201b00b91f4,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:05.321113 kubelet[2101]: E0209 18:56:05.321038 2101 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:05.321207 kubelet[2101]: E0209 18:56:05.321141 2101 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-lds2q" Feb 9 18:56:05.321207 kubelet[2101]: E0209 18:56:05.321173 2101 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-lds2q" Feb 9 18:56:05.321305 kubelet[2101]: E0209 18:56:05.321236 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-lds2q_default(98410015-68b6-4dca-814c-0201b00b91f4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-lds2q_default(98410015-68b6-4dca-814c-0201b00b91f4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-lds2q" podUID=98410015-68b6-4dca-814c-0201b00b91f4 Feb 9 18:56:05.815079 kubelet[2101]: E0209 18:56:05.814946 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:06.167890 kubelet[2101]: I0209 18:56:06.167077 2101 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:06.168226 env[1645]: time="2024-02-09T18:56:06.168194323Z" level=info msg="StopPodSandbox for \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\"" Feb 9 18:56:06.244712 env[1645]: time="2024-02-09T18:56:06.244650853Z" level=error msg="StopPodSandbox for \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\" failed" error="failed to destroy network for sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:06.245304 kubelet[2101]: E0209 18:56:06.245144 2101 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:06.245304 kubelet[2101]: E0209 18:56:06.245191 2101 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d} Feb 9 18:56:06.245304 kubelet[2101]: E0209 18:56:06.245240 2101 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"98410015-68b6-4dca-814c-0201b00b91f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:56:06.245304 kubelet[2101]: E0209 18:56:06.245280 2101 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"98410015-68b6-4dca-814c-0201b00b91f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-lds2q" podUID=98410015-68b6-4dca-814c-0201b00b91f4 Feb 9 18:56:06.815731 kubelet[2101]: E0209 18:56:06.815681 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:07.816454 kubelet[2101]: E0209 18:56:07.816399 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:08.817311 kubelet[2101]: E0209 18:56:08.817235 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:09.818092 kubelet[2101]: E0209 18:56:09.818016 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:10.818497 kubelet[2101]: E0209 18:56:10.818424 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:11.819361 kubelet[2101]: E0209 18:56:11.819252 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:12.820457 kubelet[2101]: E0209 18:56:12.820381 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:13.050926 update_engine[1634]: I0209 18:56:13.049129 1634 update_attempter.cc:509] Updating boot flags... Feb 9 18:56:13.256999 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1029290566.mount: Deactivated successfully. Feb 9 18:56:13.436701 env[1645]: time="2024-02-09T18:56:13.436645749Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:13.440546 env[1645]: time="2024-02-09T18:56:13.440502054Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:13.443479 env[1645]: time="2024-02-09T18:56:13.443435212Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:13.446141 env[1645]: time="2024-02-09T18:56:13.445979298Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:13.446802 env[1645]: time="2024-02-09T18:56:13.446765449Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 18:56:13.470536 env[1645]: time="2024-02-09T18:56:13.470490869Z" level=info msg="CreateContainer within sandbox \"1edcf42f80ad1ab26c29296a1462e4226f2c0b811049b93baaffd0a1b37afbe0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 18:56:13.492224 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3134245697.mount: Deactivated successfully. Feb 9 18:56:13.506080 env[1645]: time="2024-02-09T18:56:13.506020455Z" level=info msg="CreateContainer within sandbox \"1edcf42f80ad1ab26c29296a1462e4226f2c0b811049b93baaffd0a1b37afbe0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ac878e2b9d24a162edf11641916e44faaae0288053c191946ba371552fdca41d\"" Feb 9 18:56:13.507429 env[1645]: time="2024-02-09T18:56:13.507380042Z" level=info msg="StartContainer for \"ac878e2b9d24a162edf11641916e44faaae0288053c191946ba371552fdca41d\"" Feb 9 18:56:13.533543 systemd[1]: Started cri-containerd-ac878e2b9d24a162edf11641916e44faaae0288053c191946ba371552fdca41d.scope. Feb 9 18:56:13.590032 kernel: kauditd_printk_skb: 38 callbacks suppressed Feb 9 18:56:13.590191 kernel: audit: type=1400 audit(1707504973.576:727): avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.590234 kernel: audit: type=1300 audit(1707504973.576:727): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2227 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2227 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:13.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383738653262396432346131363265646631313634313931366534 Feb 9 18:56:13.600022 kernel: audit: type=1327 audit(1707504973.576:727): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383738653262396432346131363265646631313634313931366534 Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.606387 kernel: audit: type=1400 audit(1707504973.576:728): avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.618425 kernel: audit: type=1400 audit(1707504973.576:728): avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.631576 kernel: audit: type=1400 audit(1707504973.576:728): avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.631693 kernel: audit: type=1400 audit(1707504973.576:728): avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.641952 env[1645]: time="2024-02-09T18:56:13.641905689Z" level=info msg="StartContainer for \"ac878e2b9d24a162edf11641916e44faaae0288053c191946ba371552fdca41d\" returns successfully" Feb 9 18:56:13.645918 kernel: audit: type=1400 audit(1707504973.576:728): avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.646012 kernel: audit: type=1400 audit(1707504973.576:728): avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.656372 kernel: audit: type=1400 audit(1707504973.576:728): avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.576000 audit: BPF prog-id=93 op=LOAD Feb 9 18:56:13.576000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000361eb0 items=0 ppid=2227 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:13.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383738653262396432346131363265646631313634313931366534 Feb 9 18:56:13.582000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.582000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.582000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.582000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.582000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.582000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.582000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.582000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.582000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.582000 audit: BPF prog-id=94 op=LOAD Feb 9 18:56:13.582000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000361ef8 items=0 ppid=2227 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:13.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383738653262396432346131363265646631313634313931366534 Feb 9 18:56:13.589000 audit: BPF prog-id=94 op=UNLOAD Feb 9 18:56:13.589000 audit: BPF prog-id=93 op=UNLOAD Feb 9 18:56:13.589000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.589000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.589000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.589000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.589000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.589000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.589000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.589000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.589000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.589000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:13.589000 audit: BPF prog-id=95 op=LOAD Feb 9 18:56:13.589000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000361f88 items=0 ppid=2227 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:13.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383738653262396432346131363265646631313634313931366534 Feb 9 18:56:13.820726 kubelet[2101]: E0209 18:56:13.820579 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:13.866080 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 18:56:13.866446 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 18:56:14.821257 kubelet[2101]: E0209 18:56:14.821218 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:15.070427 env[1645]: time="2024-02-09T18:56:15.069984919Z" level=info msg="StopPodSandbox for \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\"" Feb 9 18:56:15.213270 systemd[1]: run-containerd-runc-k8s.io-ac878e2b9d24a162edf11641916e44faaae0288053c191946ba371552fdca41d-runc.Sw7Ehz.mount: Deactivated successfully. Feb 9 18:56:15.243981 kubelet[2101]: I0209 18:56:15.238795 2101 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-l5hj5" podStartSLOduration=3.794353418 podCreationTimestamp="2024-02-09 18:55:44 +0000 UTC" firstStartedPulling="2024-02-09 18:55:46.002774899 +0000 UTC m=+3.819632523" lastFinishedPulling="2024-02-09 18:56:13.447151996 +0000 UTC m=+31.264009632" observedRunningTime="2024-02-09 18:56:14.231146064 +0000 UTC m=+32.048003710" watchObservedRunningTime="2024-02-09 18:56:15.238730527 +0000 UTC m=+33.055588173" Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.240 [INFO][2933] k8s.go 578: Cleaning up netns ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.248 [INFO][2933] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" iface="eth0" netns="/var/run/netns/cni-aed29577-a50f-2bcb-2ecf-dba4d1bd86e5" Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.248 [INFO][2933] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" iface="eth0" netns="/var/run/netns/cni-aed29577-a50f-2bcb-2ecf-dba4d1bd86e5" Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.252 [INFO][2933] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" iface="eth0" netns="/var/run/netns/cni-aed29577-a50f-2bcb-2ecf-dba4d1bd86e5" Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.253 [INFO][2933] k8s.go 585: Releasing IP address(es) ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.253 [INFO][2933] utils.go 188: Calico CNI releasing IP address ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.382 [INFO][2961] ipam_plugin.go 415: Releasing address using handleID ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" HandleID="k8s-pod-network.96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.383 [INFO][2961] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.383 [INFO][2961] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.401 [WARNING][2961] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" HandleID="k8s-pod-network.96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.401 [INFO][2961] ipam_plugin.go 443: Releasing address using workloadID ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" HandleID="k8s-pod-network.96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.404 [INFO][2961] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:15.407926 env[1645]: 2024-02-09 18:56:15.406 [INFO][2933] k8s.go 591: Teardown processing complete. ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:15.410810 systemd[1]: run-netns-cni\x2daed29577\x2da50f\x2d2bcb\x2d2ecf\x2ddba4d1bd86e5.mount: Deactivated successfully. Feb 9 18:56:15.411060 env[1645]: time="2024-02-09T18:56:15.410974785Z" level=info msg="TearDown network for sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\" successfully" Feb 9 18:56:15.411060 env[1645]: time="2024-02-09T18:56:15.411017339Z" level=info msg="StopPodSandbox for \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\" returns successfully" Feb 9 18:56:15.412571 env[1645]: time="2024-02-09T18:56:15.412539091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fnq7p,Uid:c32ad2c0-bb7a-48d0-bb08-cc11b911c484,Namespace:calico-system,Attempt:1,}" Feb 9 18:56:15.465000 audit[3011]: AVC avc: denied { write } for pid=3011 comm="tee" name="fd" dev="proc" ino=19913 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:15.469000 audit[3017]: AVC avc: denied { write } for pid=3017 comm="tee" name="fd" dev="proc" ino=19916 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:15.471000 audit[3018]: AVC avc: denied { write } for pid=3018 comm="tee" name="fd" dev="proc" ino=19919 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:15.465000 audit[3011]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4472e984 a2=241 a3=1b6 items=1 ppid=2976 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.465000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 18:56:15.465000 audit: PATH item=0 name="/dev/fd/63" inode=20776 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:15.465000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:15.471000 audit[3018]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe64297985 a2=241 a3=1b6 items=1 ppid=2984 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.471000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 18:56:15.471000 audit: PATH item=0 name="/dev/fd/63" inode=19898 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:15.471000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:15.469000 audit[3017]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef1245984 a2=241 a3=1b6 items=1 ppid=2978 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.469000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 18:56:15.469000 audit: PATH item=0 name="/dev/fd/63" inode=19899 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:15.469000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:15.483000 audit[3014]: AVC avc: denied { write } for pid=3014 comm="tee" name="fd" dev="proc" ino=19928 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:15.483000 audit[3014]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7b482974 a2=241 a3=1b6 items=1 ppid=2983 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.483000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 18:56:15.483000 audit: PATH item=0 name="/dev/fd/63" inode=20777 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:15.483000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:15.498000 audit[3041]: AVC avc: denied { write } for pid=3041 comm="tee" name="fd" dev="proc" ino=19941 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:15.498000 audit[3041]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4f6da975 a2=241 a3=1b6 items=1 ppid=2974 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.498000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 18:56:15.498000 audit: PATH item=0 name="/dev/fd/63" inode=19924 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:15.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:15.516000 audit[3031]: AVC avc: denied { write } for pid=3031 comm="tee" name="fd" dev="proc" ino=20813 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:15.516000 audit[3031]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0a7aa986 a2=241 a3=1b6 items=1 ppid=2980 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.516000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 18:56:15.516000 audit: PATH item=0 name="/dev/fd/63" inode=20806 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:15.516000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:15.520000 audit[3047]: AVC avc: denied { write } for pid=3047 comm="tee" name="fd" dev="proc" ino=20817 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:15.520000 audit[3047]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd828ed984 a2=241 a3=1b6 items=1 ppid=2981 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.520000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 18:56:15.520000 audit: PATH item=0 name="/dev/fd/63" inode=19938 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:15.520000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:15.822414 kubelet[2101]: E0209 18:56:15.822337 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:15.835371 kernel: Initializing XFRM netlink socket Feb 9 18:56:15.850352 (udev-worker)[2739]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:56:15.863616 systemd-networkd[1453]: cali4725f35e20f: Link UP Feb 9 18:56:15.868199 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:56:15.868327 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4725f35e20f: link becomes ready Feb 9 18:56:15.868397 systemd-networkd[1453]: cali4725f35e20f: Gained carrier Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.511 [INFO][3020] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.558 [INFO][3020] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.20.217-k8s-csi--node--driver--fnq7p-eth0 csi-node-driver- calico-system c32ad2c0-bb7a-48d0-bb08-cc11b911c484 1014 0 2024-02-09 18:55:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.20.217 csi-node-driver-fnq7p eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali4725f35e20f [] []}} ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Namespace="calico-system" Pod="csi-node-driver-fnq7p" WorkloadEndpoint="172.31.20.217-k8s-csi--node--driver--fnq7p-" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.558 [INFO][3020] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Namespace="calico-system" Pod="csi-node-driver-fnq7p" WorkloadEndpoint="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.739 [INFO][3066] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" HandleID="k8s-pod-network.0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.758 [INFO][3066] ipam_plugin.go 268: Auto assigning IP ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" HandleID="k8s-pod-network.0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051570), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.20.217", "pod":"csi-node-driver-fnq7p", "timestamp":"2024-02-09 18:56:15.739799251 +0000 UTC"}, Hostname:"172.31.20.217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.758 [INFO][3066] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.758 [INFO][3066] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.758 [INFO][3066] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.20.217' Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.762 [INFO][3066] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" host="172.31.20.217" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.773 [INFO][3066] ipam.go 372: Looking up existing affinities for host host="172.31.20.217" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.779 [INFO][3066] ipam.go 489: Trying affinity for 192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.782 [INFO][3066] ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.786 [INFO][3066] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.786 [INFO][3066] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" host="172.31.20.217" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.788 [INFO][3066] ipam.go 1682: Creating new handle: k8s-pod-network.0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732 Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.794 [INFO][3066] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" host="172.31.20.217" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.800 [INFO][3066] ipam.go 1216: Successfully claimed IPs: [192.168.99.1/26] block=192.168.99.0/26 handle="k8s-pod-network.0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" host="172.31.20.217" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.801 [INFO][3066] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.1/26] handle="k8s-pod-network.0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" host="172.31.20.217" Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.801 [INFO][3066] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:15.887429 env[1645]: 2024-02-09 18:56:15.801 [INFO][3066] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.1/26] IPv6=[] ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" HandleID="k8s-pod-network.0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:15.888647 env[1645]: 2024-02-09 18:56:15.803 [INFO][3020] k8s.go 385: Populated endpoint ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Namespace="calico-system" Pod="csi-node-driver-fnq7p" WorkloadEndpoint="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-csi--node--driver--fnq7p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c32ad2c0-bb7a-48d0-bb08-cc11b911c484", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"", Pod:"csi-node-driver-fnq7p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4725f35e20f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:15.888647 env[1645]: 2024-02-09 18:56:15.804 [INFO][3020] k8s.go 386: Calico CNI using IPs: [192.168.99.1/32] ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Namespace="calico-system" Pod="csi-node-driver-fnq7p" WorkloadEndpoint="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:15.888647 env[1645]: 2024-02-09 18:56:15.804 [INFO][3020] dataplane_linux.go 68: Setting the host side veth name to cali4725f35e20f ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Namespace="calico-system" Pod="csi-node-driver-fnq7p" WorkloadEndpoint="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:15.888647 env[1645]: 2024-02-09 18:56:15.869 [INFO][3020] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Namespace="calico-system" Pod="csi-node-driver-fnq7p" WorkloadEndpoint="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:15.888647 env[1645]: 2024-02-09 18:56:15.869 [INFO][3020] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Namespace="calico-system" Pod="csi-node-driver-fnq7p" WorkloadEndpoint="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-csi--node--driver--fnq7p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c32ad2c0-bb7a-48d0-bb08-cc11b911c484", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732", Pod:"csi-node-driver-fnq7p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4725f35e20f", MAC:"7a:5a:8d:61:bb:4f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:15.888647 env[1645]: 2024-02-09 18:56:15.884 [INFO][3020] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732" Namespace="calico-system" Pod="csi-node-driver-fnq7p" WorkloadEndpoint="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:15.923708 env[1645]: time="2024-02-09T18:56:15.923615875Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:56:15.923870 env[1645]: time="2024-02-09T18:56:15.923722901Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:56:15.923870 env[1645]: time="2024-02-09T18:56:15.923755314Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:56:15.923993 env[1645]: time="2024-02-09T18:56:15.923912532Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732 pid=3113 runtime=io.containerd.runc.v2 Feb 9 18:56:15.955580 systemd[1]: Started cri-containerd-0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732.scope. Feb 9 18:56:15.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.982000 audit: BPF prog-id=96 op=LOAD Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3113 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066613930326136353235336161363065626634396264626338383934 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3113 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066613930326136353235336161363065626634396264626338383934 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit: BPF prog-id=97 op=LOAD Feb 9 18:56:15.983000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185660 items=0 ppid=3113 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066613930326136353235336161363065626634396264626338383934 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit: BPF prog-id=98 op=LOAD Feb 9 18:56:15.983000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001856a8 items=0 ppid=3113 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066613930326136353235336161363065626634396264626338383934 Feb 9 18:56:15.983000 audit: BPF prog-id=98 op=UNLOAD Feb 9 18:56:15.983000 audit: BPF prog-id=97 op=UNLOAD Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:15.983000 audit: BPF prog-id=99 op=LOAD Feb 9 18:56:15.983000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185ab8 items=0 ppid=3113 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:15.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066613930326136353235336161363065626634396264626338383934 Feb 9 18:56:16.012701 env[1645]: time="2024-02-09T18:56:16.012651226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fnq7p,Uid:c32ad2c0-bb7a-48d0-bb08-cc11b911c484,Namespace:calico-system,Attempt:1,} returns sandbox id \"0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732\"" Feb 9 18:56:16.014746 env[1645]: time="2024-02-09T18:56:16.014714029Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit: BPF prog-id=100 op=LOAD Feb 9 18:56:16.144000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb3379ed0 a2=70 a3=7f64b35b0000 items=0 ppid=2979 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.144000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:16.144000 audit: BPF prog-id=100 op=UNLOAD Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit: BPF prog-id=101 op=LOAD Feb 9 18:56:16.144000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb3379ed0 a2=70 a3=6e items=0 ppid=2979 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.144000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:16.144000 audit: BPF prog-id=101 op=UNLOAD Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffb3379e80 a2=70 a3=7fffb3379ed0 items=0 ppid=2979 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.144000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.144000 audit: BPF prog-id=102 op=LOAD Feb 9 18:56:16.144000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffb3379e60 a2=70 a3=7fffb3379ed0 items=0 ppid=2979 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.144000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:16.145000 audit: BPF prog-id=102 op=UNLOAD Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb3379f40 a2=70 a3=0 items=0 ppid=2979 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.145000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb3379f30 a2=70 a3=0 items=0 ppid=2979 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.145000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fffb3379f70 a2=70 a3=0 items=0 ppid=2979 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.145000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.145000 audit: BPF prog-id=103 op=LOAD Feb 9 18:56:16.145000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffb3379e90 a2=70 a3=ffffffff items=0 ppid=2979 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.145000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:16.150000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.150000 audit[3188]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8adacff0 a2=70 a3=fff80800 items=0 ppid=2979 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:56:16.150000 audit[3188]: AVC avc: denied { bpf } for pid=3188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:16.150000 audit[3188]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8adacec0 a2=70 a3=3 items=0 ppid=2979 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:56:16.146038 (udev-worker)[2750]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:56:16.158000 audit: BPF prog-id=103 op=UNLOAD Feb 9 18:56:16.242000 audit[3211]: NETFILTER_CFG table=mangle:65 family=2 entries=19 op=nft_register_chain pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:16.242000 audit[3211]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fffd0f2e550 a2=0 a3=7fffd0f2e53c items=0 ppid=2979 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.242000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:16.248000 audit[3210]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=3210 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:16.248000 audit[3210]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffdc3643620 a2=0 a3=56552cd04000 items=0 ppid=2979 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.248000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:16.253000 audit[3212]: NETFILTER_CFG table=nat:67 family=2 entries=16 op=nft_register_chain pid=3212 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:16.253000 audit[3212]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd5a0e8cc0 a2=0 a3=55dd353cc000 items=0 ppid=2979 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.253000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:16.255000 audit[3209]: NETFILTER_CFG table=filter:68 family=2 entries=71 op=nft_register_chain pid=3209 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:16.255000 audit[3209]: SYSCALL arch=c000003e syscall=46 success=yes exit=36636 a0=3 a1=7ffd3d50a810 a2=0 a3=5583ff852000 items=0 ppid=2979 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.255000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:16.823247 kubelet[2101]: E0209 18:56:16.823194 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:16.980818 systemd-networkd[1453]: vxlan.calico: Link UP Feb 9 18:56:16.980829 systemd-networkd[1453]: vxlan.calico: Gained carrier Feb 9 18:56:17.242670 systemd-networkd[1453]: cali4725f35e20f: Gained IPv6LL Feb 9 18:56:17.452259 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount439688306.mount: Deactivated successfully. Feb 9 18:56:17.824052 kubelet[2101]: E0209 18:56:17.823797 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:18.054681 env[1645]: time="2024-02-09T18:56:18.054553633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:18.059148 env[1645]: time="2024-02-09T18:56:18.059093636Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:18.061796 env[1645]: time="2024-02-09T18:56:18.061648336Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:18.064461 env[1645]: time="2024-02-09T18:56:18.064422328Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:18.065290 env[1645]: time="2024-02-09T18:56:18.065256298Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 18:56:18.068172 env[1645]: time="2024-02-09T18:56:18.068070785Z" level=info msg="CreateContainer within sandbox \"0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 18:56:18.069695 env[1645]: time="2024-02-09T18:56:18.069657485Z" level=info msg="StopPodSandbox for \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\"" Feb 9 18:56:18.091017 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3075178185.mount: Deactivated successfully. Feb 9 18:56:18.106993 env[1645]: time="2024-02-09T18:56:18.106937069Z" level=info msg="CreateContainer within sandbox \"0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0a14515844632d1237673ff4e481dc2b9d59c43a9852a6ef5342662deee57b59\"" Feb 9 18:56:18.107706 env[1645]: time="2024-02-09T18:56:18.107615080Z" level=info msg="StartContainer for \"0a14515844632d1237673ff4e481dc2b9d59c43a9852a6ef5342662deee57b59\"" Feb 9 18:56:18.136064 systemd-networkd[1453]: vxlan.calico: Gained IPv6LL Feb 9 18:56:18.170044 systemd[1]: Started cri-containerd-0a14515844632d1237673ff4e481dc2b9d59c43a9852a6ef5342662deee57b59.scope. Feb 9 18:56:18.294000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.294000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3113 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313435313538343436333264313233373637336666346534383164 Feb 9 18:56:18.295000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.295000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.295000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.295000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.295000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.295000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.295000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.295000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.295000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.295000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.295000 audit: BPF prog-id=104 op=LOAD Feb 9 18:56:18.295000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000257e10 items=0 ppid=3113 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313435313538343436333264313233373637336666346534383164 Feb 9 18:56:18.297000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.297000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.297000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.297000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.297000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.297000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.297000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.297000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.297000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.297000 audit: BPF prog-id=105 op=LOAD Feb 9 18:56:18.297000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000257e58 items=0 ppid=3113 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313435313538343436333264313233373637336666346534383164 Feb 9 18:56:18.298000 audit: BPF prog-id=105 op=UNLOAD Feb 9 18:56:18.298000 audit: BPF prog-id=104 op=UNLOAD Feb 9 18:56:18.298000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.298000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.298000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.298000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.298000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.298000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.298000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.298000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.298000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.298000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.298000 audit: BPF prog-id=106 op=LOAD Feb 9 18:56:18.298000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000257ee8 items=0 ppid=3113 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061313435313538343436333264313233373637336666346534383164 Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.162 [INFO][3244] k8s.go 578: Cleaning up netns ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.163 [INFO][3244] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" iface="eth0" netns="/var/run/netns/cni-082297cd-269d-0199-ec0d-68eb30fcfc0b" Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.163 [INFO][3244] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" iface="eth0" netns="/var/run/netns/cni-082297cd-269d-0199-ec0d-68eb30fcfc0b" Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.163 [INFO][3244] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" iface="eth0" netns="/var/run/netns/cni-082297cd-269d-0199-ec0d-68eb30fcfc0b" Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.163 [INFO][3244] k8s.go 585: Releasing IP address(es) ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.163 [INFO][3244] utils.go 188: Calico CNI releasing IP address ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.310 [INFO][3266] ipam_plugin.go 415: Releasing address using handleID ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" HandleID="k8s-pod-network.7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.310 [INFO][3266] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.310 [INFO][3266] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.324 [WARNING][3266] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" HandleID="k8s-pod-network.7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.324 [INFO][3266] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" HandleID="k8s-pod-network.7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.327 [INFO][3266] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:18.329849 env[1645]: 2024-02-09 18:56:18.328 [INFO][3244] k8s.go 591: Teardown processing complete. ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:18.330749 env[1645]: time="2024-02-09T18:56:18.330701187Z" level=info msg="TearDown network for sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\" successfully" Feb 9 18:56:18.330832 env[1645]: time="2024-02-09T18:56:18.330817055Z" level=info msg="StopPodSandbox for \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\" returns successfully" Feb 9 18:56:18.332252 env[1645]: time="2024-02-09T18:56:18.332214339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-lds2q,Uid:98410015-68b6-4dca-814c-0201b00b91f4,Namespace:default,Attempt:1,}" Feb 9 18:56:18.383756 env[1645]: time="2024-02-09T18:56:18.383499538Z" level=info msg="StartContainer for \"0a14515844632d1237673ff4e481dc2b9d59c43a9852a6ef5342662deee57b59\" returns successfully" Feb 9 18:56:18.387415 env[1645]: time="2024-02-09T18:56:18.387379075Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 18:56:18.433141 systemd[1]: run-netns-cni\x2d082297cd\x2d269d\x2d0199\x2dec0d\x2d68eb30fcfc0b.mount: Deactivated successfully. Feb 9 18:56:18.713810 systemd-networkd[1453]: calia4581de6a76: Link UP Feb 9 18:56:18.718026 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:56:18.718190 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia4581de6a76: link becomes ready Feb 9 18:56:18.718627 systemd-networkd[1453]: calia4581de6a76: Gained carrier Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.565 [INFO][3292] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0 nginx-deployment-845c78c8b9- default 98410015-68b6-4dca-814c-0201b00b91f4 1028 0 2024-02-09 18:56:04 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.20.217 nginx-deployment-845c78c8b9-lds2q eth0 default [] [] [kns.default ksa.default.default] calia4581de6a76 [] []}} ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Namespace="default" Pod="nginx-deployment-845c78c8b9-lds2q" WorkloadEndpoint="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.565 [INFO][3292] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Namespace="default" Pod="nginx-deployment-845c78c8b9-lds2q" WorkloadEndpoint="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.612 [INFO][3304] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" HandleID="k8s-pod-network.1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.628 [INFO][3304] ipam_plugin.go 268: Auto assigning IP ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" HandleID="k8s-pod-network.1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"default", "node":"172.31.20.217", "pod":"nginx-deployment-845c78c8b9-lds2q", "timestamp":"2024-02-09 18:56:18.612550856 +0000 UTC"}, Hostname:"172.31.20.217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.628 [INFO][3304] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.628 [INFO][3304] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.628 [INFO][3304] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.20.217' Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.646 [INFO][3304] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" host="172.31.20.217" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.657 [INFO][3304] ipam.go 372: Looking up existing affinities for host host="172.31.20.217" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.670 [INFO][3304] ipam.go 489: Trying affinity for 192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.673 [INFO][3304] ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.683 [INFO][3304] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.683 [INFO][3304] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" host="172.31.20.217" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.689 [INFO][3304] ipam.go 1682: Creating new handle: k8s-pod-network.1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078 Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.696 [INFO][3304] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" host="172.31.20.217" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.706 [INFO][3304] ipam.go 1216: Successfully claimed IPs: [192.168.99.2/26] block=192.168.99.0/26 handle="k8s-pod-network.1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" host="172.31.20.217" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.707 [INFO][3304] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.2/26] handle="k8s-pod-network.1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" host="172.31.20.217" Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.707 [INFO][3304] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:18.740039 env[1645]: 2024-02-09 18:56:18.707 [INFO][3304] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.2/26] IPv6=[] ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" HandleID="k8s-pod-network.1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:18.741513 env[1645]: 2024-02-09 18:56:18.710 [INFO][3292] k8s.go 385: Populated endpoint ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Namespace="default" Pod="nginx-deployment-845c78c8b9-lds2q" WorkloadEndpoint="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"98410015-68b6-4dca-814c-0201b00b91f4", ResourceVersion:"1028", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-lds2q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia4581de6a76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:18.741513 env[1645]: 2024-02-09 18:56:18.710 [INFO][3292] k8s.go 386: Calico CNI using IPs: [192.168.99.2/32] ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Namespace="default" Pod="nginx-deployment-845c78c8b9-lds2q" WorkloadEndpoint="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:18.741513 env[1645]: 2024-02-09 18:56:18.710 [INFO][3292] dataplane_linux.go 68: Setting the host side veth name to calia4581de6a76 ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Namespace="default" Pod="nginx-deployment-845c78c8b9-lds2q" WorkloadEndpoint="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:18.741513 env[1645]: 2024-02-09 18:56:18.719 [INFO][3292] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Namespace="default" Pod="nginx-deployment-845c78c8b9-lds2q" WorkloadEndpoint="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:18.741513 env[1645]: 2024-02-09 18:56:18.720 [INFO][3292] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Namespace="default" Pod="nginx-deployment-845c78c8b9-lds2q" WorkloadEndpoint="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"98410015-68b6-4dca-814c-0201b00b91f4", ResourceVersion:"1028", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078", Pod:"nginx-deployment-845c78c8b9-lds2q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia4581de6a76", MAC:"e2:58:e3:76:f0:51", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:18.741513 env[1645]: 2024-02-09 18:56:18.731 [INFO][3292] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078" Namespace="default" Pod="nginx-deployment-845c78c8b9-lds2q" WorkloadEndpoint="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:18.770600 env[1645]: time="2024-02-09T18:56:18.770523663Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:56:18.770843 env[1645]: time="2024-02-09T18:56:18.770812079Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:56:18.770971 env[1645]: time="2024-02-09T18:56:18.770945225Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:56:18.771325 env[1645]: time="2024-02-09T18:56:18.771278942Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078 pid=3332 runtime=io.containerd.runc.v2 Feb 9 18:56:18.778000 audit[3331]: NETFILTER_CFG table=filter:69 family=2 entries=40 op=nft_register_chain pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:18.780447 kernel: kauditd_printk_skb: 251 callbacks suppressed Feb 9 18:56:18.780534 kernel: audit: type=1325 audit(1707504978.778:782): table=filter:69 family=2 entries=40 op=nft_register_chain pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:18.778000 audit[3331]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7fffbf5d1620 a2=0 a3=7fffbf5d160c items=0 ppid=2979 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.796876 kernel: audit: type=1300 audit(1707504978.778:782): arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7fffbf5d1620 a2=0 a3=7fffbf5d160c items=0 ppid=2979 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.796997 kernel: audit: type=1327 audit(1707504978.778:782): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:18.778000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:18.809404 systemd[1]: Started cri-containerd-1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078.scope. Feb 9 18:56:18.824609 kubelet[2101]: E0209 18:56:18.824454 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:18.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.844054 kernel: audit: type=1400 audit(1707504978.834:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.848685 kernel: audit: type=1400 audit(1707504978.834:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.848766 kernel: audit: type=1400 audit(1707504978.834:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.854991 kernel: audit: type=1400 audit(1707504978.834:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.869131 kernel: audit: type=1400 audit(1707504978.834:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.869277 kernel: audit: type=1400 audit(1707504978.834:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit: BPF prog-id=107 op=LOAD Feb 9 18:56:18.877685 kernel: audit: type=1400 audit(1707504978.834:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3332 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653435646434633136383138666432383132623139306464613031 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3332 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653435646434633136383138666432383132623139306464613031 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.839000 audit: BPF prog-id=108 op=LOAD Feb 9 18:56:18.839000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d46f0 items=0 ppid=3332 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653435646434633136383138666432383132623139306464613031 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit: BPF prog-id=109 op=LOAD Feb 9 18:56:18.843000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d4738 items=0 ppid=3332 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653435646434633136383138666432383132623139306464613031 Feb 9 18:56:18.843000 audit: BPF prog-id=109 op=UNLOAD Feb 9 18:56:18.843000 audit: BPF prog-id=108 op=UNLOAD Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:18.843000 audit: BPF prog-id=110 op=LOAD Feb 9 18:56:18.843000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d4b48 items=0 ppid=3332 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653435646434633136383138666432383132623139306464613031 Feb 9 18:56:18.913971 env[1645]: time="2024-02-09T18:56:18.913927984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-lds2q,Uid:98410015-68b6-4dca-814c-0201b00b91f4,Namespace:default,Attempt:1,} returns sandbox id \"1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078\"" Feb 9 18:56:19.434652 systemd[1]: run-containerd-runc-k8s.io-1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078-runc.Pzbh89.mount: Deactivated successfully. Feb 9 18:56:19.825880 kubelet[2101]: E0209 18:56:19.825826 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:20.137962 env[1645]: time="2024-02-09T18:56:20.137694180Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:20.141973 env[1645]: time="2024-02-09T18:56:20.141929074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:20.144442 env[1645]: time="2024-02-09T18:56:20.144406126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:20.147061 env[1645]: time="2024-02-09T18:56:20.146920361Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:20.148456 env[1645]: time="2024-02-09T18:56:20.148416108Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 18:56:20.149941 env[1645]: time="2024-02-09T18:56:20.149910185Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 18:56:20.151402 env[1645]: time="2024-02-09T18:56:20.151367360Z" level=info msg="CreateContainer within sandbox \"0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 18:56:20.174641 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount244082613.mount: Deactivated successfully. Feb 9 18:56:20.185330 env[1645]: time="2024-02-09T18:56:20.185282197Z" level=info msg="CreateContainer within sandbox \"0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f898862becd702f10bc7420478e48ddcc008855f75379117760e34c314863387\"" Feb 9 18:56:20.187423 env[1645]: time="2024-02-09T18:56:20.187276275Z" level=info msg="StartContainer for \"f898862becd702f10bc7420478e48ddcc008855f75379117760e34c314863387\"" Feb 9 18:56:20.228975 systemd[1]: Started cri-containerd-f898862becd702f10bc7420478e48ddcc008855f75379117760e34c314863387.scope. Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3113 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:20.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638393838363262656364373032663130626337343230343738653438 Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.261000 audit: BPF prog-id=111 op=LOAD Feb 9 18:56:20.261000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8c80 items=0 ppid=3113 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:20.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638393838363262656364373032663130626337343230343738653438 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit: BPF prog-id=112 op=LOAD Feb 9 18:56:20.262000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8cc8 items=0 ppid=3113 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:20.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638393838363262656364373032663130626337343230343738653438 Feb 9 18:56:20.262000 audit: BPF prog-id=112 op=UNLOAD Feb 9 18:56:20.262000 audit: BPF prog-id=111 op=UNLOAD Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:20.262000 audit: BPF prog-id=113 op=LOAD Feb 9 18:56:20.262000 audit[3376]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8d58 items=0 ppid=3113 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:20.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638393838363262656364373032663130626337343230343738653438 Feb 9 18:56:20.293425 env[1645]: time="2024-02-09T18:56:20.293324201Z" level=info msg="StartContainer for \"f898862becd702f10bc7420478e48ddcc008855f75379117760e34c314863387\" returns successfully" Feb 9 18:56:20.435557 systemd[1]: run-containerd-runc-k8s.io-f898862becd702f10bc7420478e48ddcc008855f75379117760e34c314863387-runc.8KRQPS.mount: Deactivated successfully. Feb 9 18:56:20.630665 systemd-networkd[1453]: calia4581de6a76: Gained IPv6LL Feb 9 18:56:20.825995 kubelet[2101]: E0209 18:56:20.825954 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:20.953057 kubelet[2101]: I0209 18:56:20.952826 2101 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 18:56:20.954336 kubelet[2101]: I0209 18:56:20.953903 2101 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 18:56:21.826798 kubelet[2101]: E0209 18:56:21.826755 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:22.800851 kubelet[2101]: E0209 18:56:22.800798 2101 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:22.827032 kubelet[2101]: E0209 18:56:22.826979 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:23.827927 kubelet[2101]: E0209 18:56:23.827850 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:23.999706 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3490526368.mount: Deactivated successfully. Feb 9 18:56:24.828469 kubelet[2101]: E0209 18:56:24.828393 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:25.427404 env[1645]: time="2024-02-09T18:56:25.427353283Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:25.431152 env[1645]: time="2024-02-09T18:56:25.431106683Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:25.436016 env[1645]: time="2024-02-09T18:56:25.435960824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:25.446772 env[1645]: time="2024-02-09T18:56:25.446716056Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:25.448579 env[1645]: time="2024-02-09T18:56:25.448537351Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 18:56:25.452167 env[1645]: time="2024-02-09T18:56:25.452133628Z" level=info msg="CreateContainer within sandbox \"1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 18:56:25.480396 env[1645]: time="2024-02-09T18:56:25.480293656Z" level=info msg="CreateContainer within sandbox \"1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"fe42c1b8eb13e8b2307a4e0ca2fec5f7b2484ade0baf6c78b6b2622322e82846\"" Feb 9 18:56:25.481209 env[1645]: time="2024-02-09T18:56:25.481169780Z" level=info msg="StartContainer for \"fe42c1b8eb13e8b2307a4e0ca2fec5f7b2484ade0baf6c78b6b2622322e82846\"" Feb 9 18:56:25.520168 systemd[1]: run-containerd-runc-k8s.io-fe42c1b8eb13e8b2307a4e0ca2fec5f7b2484ade0baf6c78b6b2622322e82846-runc.Ct7rBJ.mount: Deactivated successfully. Feb 9 18:56:25.530310 systemd[1]: Started cri-containerd-fe42c1b8eb13e8b2307a4e0ca2fec5f7b2484ade0baf6c78b6b2622322e82846.scope. Feb 9 18:56:25.545464 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 9 18:56:25.545601 kernel: audit: type=1400 audit(1707504985.542:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.553412 kernel: audit: type=1400 audit(1707504985.542:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.559018 kernel: audit: type=1400 audit(1707504985.542:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.559117 kernel: audit: type=1400 audit(1707504985.542:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.568488 kernel: audit: type=1400 audit(1707504985.542:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.568602 kernel: audit: type=1400 audit(1707504985.542:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.577739 kernel: audit: type=1400 audit(1707504985.542:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.582305 kernel: audit: type=1400 audit(1707504985.542:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.588607 kernel: audit: type=1400 audit(1707504985.542:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.588708 kernel: audit: type=1400 audit(1707504985.544:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.544000 audit: BPF prog-id=114 op=LOAD Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3332 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:25.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665343263316238656231336538623233303761346530636132666563 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3332 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:25.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665343263316238656231336538623233303761346530636132666563 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit: BPF prog-id=115 op=LOAD Feb 9 18:56:25.548000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021b5f0 items=0 ppid=3332 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:25.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665343263316238656231336538623233303761346530636132666563 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit: BPF prog-id=116 op=LOAD Feb 9 18:56:25.548000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021b638 items=0 ppid=3332 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:25.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665343263316238656231336538623233303761346530636132666563 Feb 9 18:56:25.548000 audit: BPF prog-id=116 op=UNLOAD Feb 9 18:56:25.548000 audit: BPF prog-id=115 op=UNLOAD Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:25.548000 audit: BPF prog-id=117 op=LOAD Feb 9 18:56:25.548000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021ba48 items=0 ppid=3332 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:25.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665343263316238656231336538623233303761346530636132666563 Feb 9 18:56:25.595913 env[1645]: time="2024-02-09T18:56:25.595872979Z" level=info msg="StartContainer for \"fe42c1b8eb13e8b2307a4e0ca2fec5f7b2484ade0baf6c78b6b2622322e82846\" returns successfully" Feb 9 18:56:25.829417 kubelet[2101]: E0209 18:56:25.829368 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:26.283732 kubelet[2101]: I0209 18:56:26.283698 2101 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-fnq7p" podStartSLOduration=38.14908642 podCreationTimestamp="2024-02-09 18:55:44 +0000 UTC" firstStartedPulling="2024-02-09 18:56:16.014306469 +0000 UTC m=+33.831164095" lastFinishedPulling="2024-02-09 18:56:20.148856815 +0000 UTC m=+37.965714464" observedRunningTime="2024-02-09 18:56:21.272623862 +0000 UTC m=+39.089481512" watchObservedRunningTime="2024-02-09 18:56:26.283636789 +0000 UTC m=+44.100494435" Feb 9 18:56:26.830197 kubelet[2101]: E0209 18:56:26.830137 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:27.830954 kubelet[2101]: E0209 18:56:27.830834 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:27.948086 systemd[1]: run-containerd-runc-k8s.io-ac878e2b9d24a162edf11641916e44faaae0288053c191946ba371552fdca41d-runc.yN7nL9.mount: Deactivated successfully. Feb 9 18:56:28.115785 kubelet[2101]: I0209 18:56:28.115641 2101 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-lds2q" podStartSLOduration=17.581369946 podCreationTimestamp="2024-02-09 18:56:04 +0000 UTC" firstStartedPulling="2024-02-09 18:56:18.915951058 +0000 UTC m=+36.732808695" lastFinishedPulling="2024-02-09 18:56:25.450183658 +0000 UTC m=+43.267041281" observedRunningTime="2024-02-09 18:56:26.283470085 +0000 UTC m=+44.100327731" watchObservedRunningTime="2024-02-09 18:56:28.115602532 +0000 UTC m=+45.932460180" Feb 9 18:56:28.832397 kubelet[2101]: E0209 18:56:28.831683 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:29.832962 kubelet[2101]: E0209 18:56:29.832910 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:30.035000 audit[3504]: NETFILTER_CFG table=filter:70 family=2 entries=9 op=nft_register_rule pid=3504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:30.035000 audit[3504]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff6761b6c0 a2=0 a3=7fff6761b6ac items=0 ppid=2305 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:30.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:30.037000 audit[3504]: NETFILTER_CFG table=nat:71 family=2 entries=20 op=nft_register_rule pid=3504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:30.037000 audit[3504]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff6761b6c0 a2=0 a3=7fff6761b6ac items=0 ppid=2305 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:30.037000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:30.086000 audit[3508]: NETFILTER_CFG table=filter:72 family=2 entries=10 op=nft_register_rule pid=3508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:30.086000 audit[3508]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe8176ca50 a2=0 a3=7ffe8176ca3c items=0 ppid=2305 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:30.086000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:30.088000 audit[3508]: NETFILTER_CFG table=nat:73 family=2 entries=20 op=nft_register_rule pid=3508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:30.088000 audit[3508]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe8176ca50 a2=0 a3=7ffe8176ca3c items=0 ppid=2305 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:30.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:30.096159 kubelet[2101]: I0209 18:56:30.096111 2101 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:56:30.102131 systemd[1]: Created slice kubepods-besteffort-pod75948013_8498_4d4b_805b_b63182bc716d.slice. Feb 9 18:56:30.212011 kubelet[2101]: I0209 18:56:30.211973 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/75948013-8498-4d4b-805b-b63182bc716d-calico-apiserver-certs\") pod \"calico-apiserver-678c79f86f-tcnq5\" (UID: \"75948013-8498-4d4b-805b-b63182bc716d\") " pod="calico-apiserver/calico-apiserver-678c79f86f-tcnq5" Feb 9 18:56:30.212196 kubelet[2101]: I0209 18:56:30.212111 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2dx5b\" (UniqueName: \"kubernetes.io/projected/75948013-8498-4d4b-805b-b63182bc716d-kube-api-access-2dx5b\") pod \"calico-apiserver-678c79f86f-tcnq5\" (UID: \"75948013-8498-4d4b-805b-b63182bc716d\") " pod="calico-apiserver/calico-apiserver-678c79f86f-tcnq5" Feb 9 18:56:30.314363 kubelet[2101]: E0209 18:56:30.314307 2101 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 18:56:30.314569 kubelet[2101]: E0209 18:56:30.314427 2101 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/75948013-8498-4d4b-805b-b63182bc716d-calico-apiserver-certs podName:75948013-8498-4d4b-805b-b63182bc716d nodeName:}" failed. No retries permitted until 2024-02-09 18:56:30.81440046 +0000 UTC m=+48.631258104 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/75948013-8498-4d4b-805b-b63182bc716d-calico-apiserver-certs") pod "calico-apiserver-678c79f86f-tcnq5" (UID: "75948013-8498-4d4b-805b-b63182bc716d") : secret "calico-apiserver-certs" not found Feb 9 18:56:30.520605 kubelet[2101]: I0209 18:56:30.520558 2101 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:56:30.532237 systemd[1]: Created slice kubepods-besteffort-podec2fbd0e_cf33_4c4c_9bec_c72e769ac6b3.slice. Feb 9 18:56:30.616021 kubelet[2101]: I0209 18:56:30.615975 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ec2fbd0e-cf33-4c4c-9bec-c72e769ac6b3-data\") pod \"nfs-server-provisioner-0\" (UID: \"ec2fbd0e-cf33-4c4c-9bec-c72e769ac6b3\") " pod="default/nfs-server-provisioner-0" Feb 9 18:56:30.616181 kubelet[2101]: I0209 18:56:30.616033 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d8k6j\" (UniqueName: \"kubernetes.io/projected/ec2fbd0e-cf33-4c4c-9bec-c72e769ac6b3-kube-api-access-d8k6j\") pod \"nfs-server-provisioner-0\" (UID: \"ec2fbd0e-cf33-4c4c-9bec-c72e769ac6b3\") " pod="default/nfs-server-provisioner-0" Feb 9 18:56:30.839173 kubelet[2101]: E0209 18:56:30.838994 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:30.842159 env[1645]: time="2024-02-09T18:56:30.841484458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ec2fbd0e-cf33-4c4c-9bec-c72e769ac6b3,Namespace:default,Attempt:0,}" Feb 9 18:56:31.007442 env[1645]: time="2024-02-09T18:56:31.007392105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-678c79f86f-tcnq5,Uid:75948013-8498-4d4b-805b-b63182bc716d,Namespace:calico-apiserver,Attempt:0,}" Feb 9 18:56:31.082035 (udev-worker)[3506]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:56:31.085453 systemd-networkd[1453]: cali60e51b789ff: Link UP Feb 9 18:56:31.090024 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:56:31.090562 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 18:56:31.089915 systemd-networkd[1453]: cali60e51b789ff: Gained carrier Feb 9 18:56:31.103000 audit[3546]: NETFILTER_CFG table=filter:74 family=2 entries=22 op=nft_register_rule pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:31.109368 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 9 18:56:31.109499 kernel: audit: type=1325 audit(1707504991.103:829): table=filter:74 family=2 entries=22 op=nft_register_rule pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:31.103000 audit[3546]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffc4a180c40 a2=0 a3=7ffc4a180c2c items=0 ppid=2305 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.119374 kernel: audit: type=1300 audit(1707504991.103:829): arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffc4a180c40 a2=0 a3=7ffc4a180c2c items=0 ppid=2305 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.933 [INFO][3513] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.20.217-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ec2fbd0e-cf33-4c4c-9bec-c72e769ac6b3 1141 0 2024-02-09 18:56:30 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.20.217 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.20.217-k8s-nfs--server--provisioner--0-" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.933 [INFO][3513] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.20.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.969 [INFO][3524] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" HandleID="k8s-pod-network.365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Workload="172.31.20.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.982 [INFO][3524] ipam_plugin.go 268: Auto assigning IP ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" HandleID="k8s-pod-network.365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Workload="172.31.20.217-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"default", "node":"172.31.20.217", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 18:56:30.969534518 +0000 UTC"}, Hostname:"172.31.20.217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.982 [INFO][3524] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.982 [INFO][3524] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.982 [INFO][3524] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.20.217' Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.985 [INFO][3524] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" host="172.31.20.217" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.991 [INFO][3524] ipam.go 372: Looking up existing affinities for host host="172.31.20.217" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.997 [INFO][3524] ipam.go 489: Trying affinity for 192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:30.999 [INFO][3524] ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:31.006 [INFO][3524] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:31.006 [INFO][3524] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" host="172.31.20.217" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:31.009 [INFO][3524] ipam.go 1682: Creating new handle: k8s-pod-network.365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5 Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:31.017 [INFO][3524] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" host="172.31.20.217" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:31.070 [INFO][3524] ipam.go 1216: Successfully claimed IPs: [192.168.99.3/26] block=192.168.99.0/26 handle="k8s-pod-network.365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" host="172.31.20.217" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:31.070 [INFO][3524] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.3/26] handle="k8s-pod-network.365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" host="172.31.20.217" Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:31.070 [INFO][3524] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:31.121915 env[1645]: 2024-02-09 18:56:31.070 [INFO][3524] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.3/26] IPv6=[] ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" HandleID="k8s-pod-network.365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Workload="172.31.20.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:31.123473 env[1645]: 2024-02-09 18:56:31.075 [INFO][3513] k8s.go 385: Populated endpoint ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.20.217-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ec2fbd0e-cf33-4c4c-9bec-c72e769ac6b3", ResourceVersion:"1141", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:31.123473 env[1645]: 2024-02-09 18:56:31.078 [INFO][3513] k8s.go 386: Calico CNI using IPs: [192.168.99.3/32] ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.20.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:31.123473 env[1645]: 2024-02-09 18:56:31.078 [INFO][3513] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.20.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:31.123473 env[1645]: 2024-02-09 18:56:31.093 [INFO][3513] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.20.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:31.123747 env[1645]: 2024-02-09 18:56:31.093 [INFO][3513] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.20.217-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ec2fbd0e-cf33-4c4c-9bec-c72e769ac6b3", ResourceVersion:"1141", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"0a:34:00:95:91:43", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:31.123747 env[1645]: 2024-02-09 18:56:31.118 [INFO][3513] k8s.go 491: Wrote updated endpoint to datastore ContainerID="365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.20.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:31.132425 kernel: audit: type=1327 audit(1707504991.103:829): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:31.132562 kernel: audit: type=1325 audit(1707504991.123:830): table=nat:75 family=2 entries=20 op=nft_register_rule pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:31.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:31.123000 audit[3546]: NETFILTER_CFG table=nat:75 family=2 entries=20 op=nft_register_rule pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:31.123000 audit[3546]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc4a180c40 a2=0 a3=31030 items=0 ppid=2305 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.142408 kernel: audit: type=1300 audit(1707504991.123:830): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc4a180c40 a2=0 a3=31030 items=0 ppid=2305 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.150472 kernel: audit: type=1327 audit(1707504991.123:830): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:31.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:31.186226 env[1645]: time="2024-02-09T18:56:31.186147737Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:56:31.186842 env[1645]: time="2024-02-09T18:56:31.186198911Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:56:31.186842 env[1645]: time="2024-02-09T18:56:31.186214506Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:56:31.186842 env[1645]: time="2024-02-09T18:56:31.186390163Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5 pid=3572 runtime=io.containerd.runc.v2 Feb 9 18:56:31.200990 kernel: audit: type=1325 audit(1707504991.189:831): table=filter:76 family=2 entries=38 op=nft_register_chain pid=3569 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:31.201131 kernel: audit: type=1300 audit(1707504991.189:831): arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffc07981280 a2=0 a3=7ffc0798126c items=0 ppid=2979 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.189000 audit[3569]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_chain pid=3569 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:31.189000 audit[3569]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffc07981280 a2=0 a3=7ffc0798126c items=0 ppid=2979 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.189000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:31.208381 kernel: audit: type=1327 audit(1707504991.189:831): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:31.235995 systemd[1]: Started cri-containerd-365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5.scope. Feb 9 18:56:31.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.261000 audit: BPF prog-id=118 op=LOAD Feb 9 18:56:31.262443 kernel: audit: type=1400 audit(1707504991.256:832): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3572 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336356165613265323762646630653336373862623030653065383734 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3572 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336356165613265323762646630653336373862623030653065383734 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.265000 audit: BPF prog-id=119 op=LOAD Feb 9 18:56:31.265000 audit[3580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025710 items=0 ppid=3572 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336356165613265323762646630653336373862623030653065383734 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit: BPF prog-id=120 op=LOAD Feb 9 18:56:31.266000 audit[3580]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025758 items=0 ppid=3572 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336356165613265323762646630653336373862623030653065383734 Feb 9 18:56:31.266000 audit: BPF prog-id=120 op=UNLOAD Feb 9 18:56:31.266000 audit: BPF prog-id=119 op=UNLOAD Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.266000 audit: BPF prog-id=121 op=LOAD Feb 9 18:56:31.266000 audit[3580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025b68 items=0 ppid=3572 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336356165613265323762646630653336373862623030653065383734 Feb 9 18:56:31.309176 env[1645]: time="2024-02-09T18:56:31.309131980Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ec2fbd0e-cf33-4c4c-9bec-c72e769ac6b3,Namespace:default,Attempt:0,} returns sandbox id \"365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5\"" Feb 9 18:56:31.311364 env[1645]: time="2024-02-09T18:56:31.311304282Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 18:56:31.360700 (udev-worker)[3547]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:56:31.368447 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid4496ffa157: link becomes ready Feb 9 18:56:31.367260 systemd-networkd[1453]: calid4496ffa157: Link UP Feb 9 18:56:31.367595 systemd-networkd[1453]: calid4496ffa157: Gained carrier Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.173 [INFO][3531] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0 calico-apiserver-678c79f86f- calico-apiserver 75948013-8498-4d4b-805b-b63182bc716d 1118 0 2024-02-09 18:56:29 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:678c79f86f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.20.217 calico-apiserver-678c79f86f-tcnq5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid4496ffa157 [] []}} ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-tcnq5" WorkloadEndpoint="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.173 [INFO][3531] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-tcnq5" WorkloadEndpoint="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.273 [INFO][3579] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" HandleID="k8s-pod-network.ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Workload="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.291 [INFO][3579] ipam_plugin.go 268: Auto assigning IP ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" HandleID="k8s-pod-network.ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Workload="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051950), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.20.217", "pod":"calico-apiserver-678c79f86f-tcnq5", "timestamp":"2024-02-09 18:56:31.273920503 +0000 UTC"}, Hostname:"172.31.20.217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.292 [INFO][3579] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.292 [INFO][3579] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.292 [INFO][3579] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.20.217' Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.295 [INFO][3579] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" host="172.31.20.217" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.305 [INFO][3579] ipam.go 372: Looking up existing affinities for host host="172.31.20.217" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.315 [INFO][3579] ipam.go 489: Trying affinity for 192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.319 [INFO][3579] ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.324 [INFO][3579] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="172.31.20.217" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.324 [INFO][3579] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" host="172.31.20.217" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.332 [INFO][3579] ipam.go 1682: Creating new handle: k8s-pod-network.ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180 Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.343 [INFO][3579] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" host="172.31.20.217" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.355 [INFO][3579] ipam.go 1216: Successfully claimed IPs: [192.168.99.4/26] block=192.168.99.0/26 handle="k8s-pod-network.ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" host="172.31.20.217" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.355 [INFO][3579] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.4/26] handle="k8s-pod-network.ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" host="172.31.20.217" Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.355 [INFO][3579] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:31.388745 env[1645]: 2024-02-09 18:56:31.355 [INFO][3579] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.4/26] IPv6=[] ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" HandleID="k8s-pod-network.ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Workload="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0" Feb 9 18:56:31.389582 env[1645]: 2024-02-09 18:56:31.357 [INFO][3531] k8s.go 385: Populated endpoint ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-tcnq5" WorkloadEndpoint="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0", GenerateName:"calico-apiserver-678c79f86f-", Namespace:"calico-apiserver", SelfLink:"", UID:"75948013-8498-4d4b-805b-b63182bc716d", ResourceVersion:"1118", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"678c79f86f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"", Pod:"calico-apiserver-678c79f86f-tcnq5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid4496ffa157", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:31.389582 env[1645]: 2024-02-09 18:56:31.357 [INFO][3531] k8s.go 386: Calico CNI using IPs: [192.168.99.4/32] ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-tcnq5" WorkloadEndpoint="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0" Feb 9 18:56:31.389582 env[1645]: 2024-02-09 18:56:31.357 [INFO][3531] dataplane_linux.go 68: Setting the host side veth name to calid4496ffa157 ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-tcnq5" WorkloadEndpoint="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0" Feb 9 18:56:31.389582 env[1645]: 2024-02-09 18:56:31.374 [INFO][3531] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-tcnq5" WorkloadEndpoint="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0" Feb 9 18:56:31.389582 env[1645]: 2024-02-09 18:56:31.378 [INFO][3531] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-tcnq5" WorkloadEndpoint="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0", GenerateName:"calico-apiserver-678c79f86f-", Namespace:"calico-apiserver", SelfLink:"", UID:"75948013-8498-4d4b-805b-b63182bc716d", ResourceVersion:"1118", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"678c79f86f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180", Pod:"calico-apiserver-678c79f86f-tcnq5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid4496ffa157", MAC:"3e:54:0f:98:78:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:31.389582 env[1645]: 2024-02-09 18:56:31.386 [INFO][3531] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-tcnq5" WorkloadEndpoint="172.31.20.217-k8s-calico--apiserver--678c79f86f--tcnq5-eth0" Feb 9 18:56:31.407491 env[1645]: time="2024-02-09T18:56:31.407415255Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:56:31.407491 env[1645]: time="2024-02-09T18:56:31.407466889Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:56:31.419044 env[1645]: time="2024-02-09T18:56:31.407765368Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:56:31.419044 env[1645]: time="2024-02-09T18:56:31.407928449Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180 pid=3629 runtime=io.containerd.runc.v2 Feb 9 18:56:31.446000 systemd[1]: Started cri-containerd-ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180.scope. Feb 9 18:56:31.450700 systemd[1]: run-containerd-runc-k8s.io-ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180-runc.ixMcpd.mount: Deactivated successfully. Feb 9 18:56:31.473000 audit[3659]: NETFILTER_CFG table=filter:77 family=2 entries=55 op=nft_register_chain pid=3659 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:31.473000 audit[3659]: SYSCALL arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7ffde08ac490 a2=0 a3=7ffde08ac47c items=0 ppid=2979 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.473000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:31.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.474000 audit: BPF prog-id=122 op=LOAD Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3629 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333238616165346265663765373164663134326432653733373637 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3629 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333238616165346265663765373164663134326432653733373637 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.476000 audit: BPF prog-id=123 op=LOAD Feb 9 18:56:31.476000 audit[3637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000358940 items=0 ppid=3629 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333238616165346265663765373164663134326432653733373637 Feb 9 18:56:31.477000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.477000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.477000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.477000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.477000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.477000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.477000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.477000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.477000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.477000 audit: BPF prog-id=124 op=LOAD Feb 9 18:56:31.477000 audit[3637]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000358988 items=0 ppid=3629 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333238616165346265663765373164663134326432653733373637 Feb 9 18:56:31.478000 audit: BPF prog-id=124 op=UNLOAD Feb 9 18:56:31.478000 audit: BPF prog-id=123 op=UNLOAD Feb 9 18:56:31.478000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.478000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.478000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.478000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.478000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.478000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.478000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.478000 audit[3637]: AVC avc: denied { perfmon } for pid=3637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.478000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.478000 audit[3637]: AVC avc: denied { bpf } for pid=3637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:31.478000 audit: BPF prog-id=125 op=LOAD Feb 9 18:56:31.478000 audit[3637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000358d98 items=0 ppid=3629 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333238616165346265663765373164663134326432653733373637 Feb 9 18:56:31.513499 env[1645]: time="2024-02-09T18:56:31.513448822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-678c79f86f-tcnq5,Uid:75948013-8498-4d4b-805b-b63182bc716d,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180\"" Feb 9 18:56:31.840286 kubelet[2101]: E0209 18:56:31.840241 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:32.841369 kubelet[2101]: E0209 18:56:32.841318 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:33.112719 systemd-networkd[1453]: cali60e51b789ff: Gained IPv6LL Feb 9 18:56:33.250130 systemd-networkd[1453]: calid4496ffa157: Gained IPv6LL Feb 9 18:56:33.841874 kubelet[2101]: E0209 18:56:33.841799 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:34.842624 kubelet[2101]: E0209 18:56:34.842585 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:35.306515 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4286826136.mount: Deactivated successfully. Feb 9 18:56:35.843734 kubelet[2101]: E0209 18:56:35.843694 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:36.844137 kubelet[2101]: E0209 18:56:36.844069 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:37.844917 kubelet[2101]: E0209 18:56:37.844880 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:38.100000 audit[3678]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_rule pid=3678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:38.103011 kernel: kauditd_printk_skb: 116 callbacks suppressed Feb 9 18:56:38.103111 kernel: audit: type=1325 audit(1707504998.100:869): table=filter:78 family=2 entries=34 op=nft_register_rule pid=3678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:38.100000 audit[3678]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7fffddf36da0 a2=0 a3=7fffddf36d8c items=0 ppid=2305 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.115374 kernel: audit: type=1300 audit(1707504998.100:869): arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7fffddf36da0 a2=0 a3=7fffddf36d8c items=0 ppid=2305 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.100000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:38.120000 audit[3678]: NETFILTER_CFG table=nat:79 family=2 entries=20 op=nft_register_rule pid=3678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:38.129809 kernel: audit: type=1327 audit(1707504998.100:869): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:38.129902 kernel: audit: type=1325 audit(1707504998.120:870): table=nat:79 family=2 entries=20 op=nft_register_rule pid=3678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:38.120000 audit[3678]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffddf36da0 a2=0 a3=31030 items=0 ppid=2305 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.137489 kernel: audit: type=1300 audit(1707504998.120:870): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffddf36da0 a2=0 a3=31030 items=0 ppid=2305 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:38.141364 kernel: audit: type=1327 audit(1707504998.120:870): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:38.367829 env[1645]: time="2024-02-09T18:56:38.367711010Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:38.371140 env[1645]: time="2024-02-09T18:56:38.371093744Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:38.374006 env[1645]: time="2024-02-09T18:56:38.373961608Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:38.376546 env[1645]: time="2024-02-09T18:56:38.376450758Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:38.377223 env[1645]: time="2024-02-09T18:56:38.377184580Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 18:56:38.378714 env[1645]: time="2024-02-09T18:56:38.378621659Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 18:56:38.379884 env[1645]: time="2024-02-09T18:56:38.379849708Z" level=info msg="CreateContainer within sandbox \"365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 18:56:38.418747 env[1645]: time="2024-02-09T18:56:38.418695220Z" level=info msg="CreateContainer within sandbox \"365aea2e27bdf0e3678bb00e0e874b3f2b09d3da5baa6c68521b9006910415d5\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"1591826b3dc5e840f6628c9373b1248a42f6d8ce8289c69bf3729e5bd098836e\"" Feb 9 18:56:38.419576 env[1645]: time="2024-02-09T18:56:38.419535365Z" level=info msg="StartContainer for \"1591826b3dc5e840f6628c9373b1248a42f6d8ce8289c69bf3729e5bd098836e\"" Feb 9 18:56:38.450224 systemd[1]: Started cri-containerd-1591826b3dc5e840f6628c9373b1248a42f6d8ce8289c69bf3729e5bd098836e.scope. Feb 9 18:56:38.484094 kernel: audit: type=1400 audit(1707504998.473:871): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.484239 kernel: audit: type=1400 audit(1707504998.473:872): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.494073 kernel: audit: type=1400 audit(1707504998.473:873): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.494139 kernel: audit: type=1400 audit(1707504998.473:874): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit: BPF prog-id=126 op=LOAD Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3572 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393138323662336463356538343066363632386339333733623132 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3572 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393138323662336463356538343066363632386339333733623132 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.473000 audit: BPF prog-id=127 op=LOAD Feb 9 18:56:38.473000 audit[3687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001f9c50 items=0 ppid=3572 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393138323662336463356538343066363632386339333733623132 Feb 9 18:56:38.478000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.478000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.478000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.478000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.478000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.478000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.478000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.478000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.478000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.478000 audit: BPF prog-id=128 op=LOAD Feb 9 18:56:38.478000 audit[3687]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001f9c98 items=0 ppid=3572 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393138323662336463356538343066363632386339333733623132 Feb 9 18:56:38.482000 audit: BPF prog-id=128 op=UNLOAD Feb 9 18:56:38.482000 audit: BPF prog-id=127 op=UNLOAD Feb 9 18:56:38.482000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.482000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.482000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.482000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.482000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.482000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.482000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.482000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.482000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.482000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.482000 audit: BPF prog-id=129 op=LOAD Feb 9 18:56:38.482000 audit[3687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00033a0a8 items=0 ppid=3572 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393138323662336463356538343066363632386339333733623132 Feb 9 18:56:38.551610 env[1645]: time="2024-02-09T18:56:38.551559348Z" level=info msg="StartContainer for \"1591826b3dc5e840f6628c9373b1248a42f6d8ce8289c69bf3729e5bd098836e\" returns successfully" Feb 9 18:56:38.575000 audit[3716]: AVC avc: denied { search } for pid=3716 comm="rpcbind" name="crypto" dev="proc" ino=23623 scontext=system_u:system_r:svirt_lxc_net_t:s0:c479,c949 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:56:38.575000 audit[3716]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f0e559060c0 a2=0 a3=0 items=0 ppid=3698 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c479,c949 key=(null) Feb 9 18:56:38.575000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 18:56:38.644000 audit[3721]: AVC avc: denied { search } for pid=3721 comm="dbus-daemon" name="crypto" dev="proc" ino=23623 scontext=system_u:system_r:svirt_lxc_net_t:s0:c479,c949 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:56:38.644000 audit[3721]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f7fa3e840c0 a2=0 a3=0 items=0 ppid=3698 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c479,c949 key=(null) Feb 9 18:56:38.644000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 18:56:38.651000 audit[3722]: AVC avc: denied { watch } for pid=3722 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538045 scontext=system_u:system_r:svirt_lxc_net_t:s0:c479,c949 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c479,c949 tclass=dir permissive=0 Feb 9 18:56:38.651000 audit[3722]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55be9acb8d30 a2=2c8 a3=7ffcd5a6caac items=0 ppid=3698 pid=3722 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c479,c949 key=(null) Feb 9 18:56:38.651000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 18:56:38.657000 audit[3723]: AVC avc: denied { read } for pid=3723 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24715 scontext=system_u:system_r:svirt_lxc_net_t:s0:c479,c949 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 18:56:38.657000 audit[3723]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f4e7fe4d320 a1=80000 a2=d a3=7fff9ab04f30 items=0 ppid=3698 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c479,c949 key=(null) Feb 9 18:56:38.657000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 18:56:38.658000 audit[3723]: AVC avc: denied { search } for pid=3723 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23623 scontext=system_u:system_r:svirt_lxc_net_t:s0:c479,c949 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:56:38.658000 audit[3723]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4e7f3a10c0 a2=0 a3=0 items=0 ppid=3698 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c479,c949 key=(null) Feb 9 18:56:38.658000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 18:56:38.846219 kubelet[2101]: E0209 18:56:38.846178 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:39.360168 kubelet[2101]: I0209 18:56:39.360129 2101 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.293229624 podCreationTimestamp="2024-02-09 18:56:30 +0000 UTC" firstStartedPulling="2024-02-09 18:56:31.310837639 +0000 UTC m=+49.127695274" lastFinishedPulling="2024-02-09 18:56:38.377635945 +0000 UTC m=+56.194493581" observedRunningTime="2024-02-09 18:56:39.359526656 +0000 UTC m=+57.176384301" watchObservedRunningTime="2024-02-09 18:56:39.360027931 +0000 UTC m=+57.176885576" Feb 9 18:56:39.388000 audit[3728]: NETFILTER_CFG table=filter:80 family=2 entries=22 op=nft_register_rule pid=3728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:39.388000 audit[3728]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdf1d3a7d0 a2=0 a3=7ffdf1d3a7bc items=0 ppid=2305 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:39.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:39.392000 audit[3728]: NETFILTER_CFG table=nat:81 family=2 entries=104 op=nft_register_chain pid=3728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:39.392000 audit[3728]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffdf1d3a7d0 a2=0 a3=7ffdf1d3a7bc items=0 ppid=2305 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:39.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:39.710970 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4231284235.mount: Deactivated successfully. Feb 9 18:56:39.846605 kubelet[2101]: E0209 18:56:39.846406 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:40.846657 kubelet[2101]: E0209 18:56:40.846564 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:41.848266 kubelet[2101]: E0209 18:56:41.848105 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:42.805475 kubelet[2101]: E0209 18:56:42.805367 2101 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:42.820038 env[1645]: time="2024-02-09T18:56:42.819997044Z" level=info msg="StopPodSandbox for \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\"" Feb 9 18:56:42.848669 kubelet[2101]: E0209 18:56:42.848617 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:42.870212 env[1645]: time="2024-02-09T18:56:42.870159791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:42.878151 env[1645]: time="2024-02-09T18:56:42.876676244Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:42.880504 env[1645]: time="2024-02-09T18:56:42.880458604Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:42.883169 env[1645]: time="2024-02-09T18:56:42.882989248Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:42.883583 env[1645]: time="2024-02-09T18:56:42.883545908Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 18:56:42.908482 env[1645]: time="2024-02-09T18:56:42.908246879Z" level=info msg="CreateContainer within sandbox \"ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 18:56:42.939160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3252745618.mount: Deactivated successfully. Feb 9 18:56:42.952253 env[1645]: time="2024-02-09T18:56:42.952206687Z" level=info msg="CreateContainer within sandbox \"ab328aae4bef7e71df142d2e73767af3b8d36e061a640598861961a3b5545180\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e0c513b9875d6dfd1d4b21180ca8bac9d14301bd210978193cc950c3d2a4a3b6\"" Feb 9 18:56:42.953723 env[1645]: time="2024-02-09T18:56:42.953687708Z" level=info msg="StartContainer for \"e0c513b9875d6dfd1d4b21180ca8bac9d14301bd210978193cc950c3d2a4a3b6\"" Feb 9 18:56:42.994473 systemd[1]: Started cri-containerd-e0c513b9875d6dfd1d4b21180ca8bac9d14301bd210978193cc950c3d2a4a3b6.scope. Feb 9 18:56:43.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.029000 audit: BPF prog-id=130 op=LOAD Feb 9 18:56:43.030000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.030000 audit[3760]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3629 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633531336239383735643664666431643462323131383063613862 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit[3760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3629 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633531336239383735643664666431643462323131383063613862 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.031000 audit: BPF prog-id=131 op=LOAD Feb 9 18:56:43.031000 audit[3760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0000253d0 items=0 ppid=3629 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633531336239383735643664666431643462323131383063613862 Feb 9 18:56:43.033000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.033000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.033000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.033000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.033000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.033000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.033000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.033000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.033000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.033000 audit: BPF prog-id=132 op=LOAD Feb 9 18:56:43.033000 audit[3760]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025418 items=0 ppid=3629 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633531336239383735643664666431643462323131383063613862 Feb 9 18:56:43.034000 audit: BPF prog-id=132 op=UNLOAD Feb 9 18:56:43.034000 audit: BPF prog-id=131 op=UNLOAD Feb 9 18:56:43.034000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.034000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.034000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.034000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.034000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.034000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.034000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.034000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.034000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.034000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:43.034000 audit: BPF prog-id=133 op=LOAD Feb 9 18:56:43.034000 audit[3760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025828 items=0 ppid=3629 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633531336239383735643664666431643462323131383063613862 Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:42.986 [WARNING][3746] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-csi--node--driver--fnq7p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c32ad2c0-bb7a-48d0-bb08-cc11b911c484", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732", Pod:"csi-node-driver-fnq7p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4725f35e20f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:42.987 [INFO][3746] k8s.go 578: Cleaning up netns ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:42.987 [INFO][3746] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" iface="eth0" netns="" Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:42.987 [INFO][3746] k8s.go 585: Releasing IP address(es) ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:42.987 [INFO][3746] utils.go 188: Calico CNI releasing IP address ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:43.050 [INFO][3768] ipam_plugin.go 415: Releasing address using handleID ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" HandleID="k8s-pod-network.96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:43.050 [INFO][3768] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:43.050 [INFO][3768] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:43.064 [WARNING][3768] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" HandleID="k8s-pod-network.96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:43.064 [INFO][3768] ipam_plugin.go 443: Releasing address using workloadID ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" HandleID="k8s-pod-network.96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:43.067 [INFO][3768] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:43.076704 env[1645]: 2024-02-09 18:56:43.072 [INFO][3746] k8s.go 591: Teardown processing complete. ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:43.076704 env[1645]: time="2024-02-09T18:56:43.074257750Z" level=info msg="TearDown network for sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\" successfully" Feb 9 18:56:43.076704 env[1645]: time="2024-02-09T18:56:43.074288325Z" level=info msg="StopPodSandbox for \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\" returns successfully" Feb 9 18:56:43.076704 env[1645]: time="2024-02-09T18:56:43.075081400Z" level=info msg="RemovePodSandbox for \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\"" Feb 9 18:56:43.076704 env[1645]: time="2024-02-09T18:56:43.075118664Z" level=info msg="Forcibly stopping sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\"" Feb 9 18:56:43.133445 env[1645]: time="2024-02-09T18:56:43.133393281Z" level=info msg="StartContainer for \"e0c513b9875d6dfd1d4b21180ca8bac9d14301bd210978193cc950c3d2a4a3b6\" returns successfully" Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.190 [WARNING][3811] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-csi--node--driver--fnq7p-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c32ad2c0-bb7a-48d0-bb08-cc11b911c484", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"0fa902a65253aa60ebf49bdbc8894e102fadfd6f71901ee7af21add67904e732", Pod:"csi-node-driver-fnq7p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4725f35e20f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.190 [INFO][3811] k8s.go 578: Cleaning up netns ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.190 [INFO][3811] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" iface="eth0" netns="" Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.191 [INFO][3811] k8s.go 585: Releasing IP address(es) ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.191 [INFO][3811] utils.go 188: Calico CNI releasing IP address ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.280 [INFO][3820] ipam_plugin.go 415: Releasing address using handleID ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" HandleID="k8s-pod-network.96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.280 [INFO][3820] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.280 [INFO][3820] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.294 [WARNING][3820] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" HandleID="k8s-pod-network.96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.294 [INFO][3820] ipam_plugin.go 443: Releasing address using workloadID ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" HandleID="k8s-pod-network.96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Workload="172.31.20.217-k8s-csi--node--driver--fnq7p-eth0" Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.296 [INFO][3820] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:43.301046 env[1645]: 2024-02-09 18:56:43.299 [INFO][3811] k8s.go 591: Teardown processing complete. ContainerID="96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a" Feb 9 18:56:43.301773 env[1645]: time="2024-02-09T18:56:43.301106622Z" level=info msg="TearDown network for sandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\" successfully" Feb 9 18:56:43.381107 kubelet[2101]: I0209 18:56:43.381001 2101 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-678c79f86f-tcnq5" podStartSLOduration=3.010915854 podCreationTimestamp="2024-02-09 18:56:29 +0000 UTC" firstStartedPulling="2024-02-09 18:56:31.51481026 +0000 UTC m=+49.331667882" lastFinishedPulling="2024-02-09 18:56:42.884737688 +0000 UTC m=+60.701595314" observedRunningTime="2024-02-09 18:56:43.379476612 +0000 UTC m=+61.196334258" watchObservedRunningTime="2024-02-09 18:56:43.380843286 +0000 UTC m=+61.197700933" Feb 9 18:56:43.400787 env[1645]: time="2024-02-09T18:56:43.400729376Z" level=info msg="RemovePodSandbox \"96a9f2db36df252ca4e4a8c348d26ced1f957c4c92a18355a60924dfb38ad87a\" returns successfully" Feb 9 18:56:43.404395 env[1645]: time="2024-02-09T18:56:43.404336490Z" level=info msg="StopPodSandbox for \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\"" Feb 9 18:56:43.463360 kernel: kauditd_printk_skb: 131 callbacks suppressed Feb 9 18:56:43.463530 kernel: audit: type=1325 audit(1707505003.444:914): table=filter:82 family=2 entries=10 op=nft_register_rule pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:43.463575 kernel: audit: type=1300 audit(1707505003.444:914): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe1cb06e80 a2=0 a3=7ffe1cb06e6c items=0 ppid=2305 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.444000 audit[3844]: NETFILTER_CFG table=filter:82 family=2 entries=10 op=nft_register_rule pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:43.444000 audit[3844]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe1cb06e80 a2=0 a3=7ffe1cb06e6c items=0 ppid=2305 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.444000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:43.468445 kernel: audit: type=1327 audit(1707505003.444:914): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:43.489097 kernel: audit: type=1325 audit(1707505003.447:915): table=nat:83 family=2 entries=44 op=nft_register_rule pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:43.489241 kernel: audit: type=1300 audit(1707505003.447:915): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffe1cb06e80 a2=0 a3=7ffe1cb06e6c items=0 ppid=2305 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.447000 audit[3844]: NETFILTER_CFG table=nat:83 family=2 entries=44 op=nft_register_rule pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:43.447000 audit[3844]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffe1cb06e80 a2=0 a3=7ffe1cb06e6c items=0 ppid=2305 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:43.494363 kernel: audit: type=1327 audit(1707505003.447:915): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.524 [WARNING][3840] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"98410015-68b6-4dca-814c-0201b00b91f4", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078", Pod:"nginx-deployment-845c78c8b9-lds2q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia4581de6a76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.525 [INFO][3840] k8s.go 578: Cleaning up netns ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.525 [INFO][3840] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" iface="eth0" netns="" Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.525 [INFO][3840] k8s.go 585: Releasing IP address(es) ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.525 [INFO][3840] utils.go 188: Calico CNI releasing IP address ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.603 [INFO][3847] ipam_plugin.go 415: Releasing address using handleID ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" HandleID="k8s-pod-network.7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.604 [INFO][3847] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.604 [INFO][3847] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.616 [WARNING][3847] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" HandleID="k8s-pod-network.7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.616 [INFO][3847] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" HandleID="k8s-pod-network.7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.626 [INFO][3847] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:43.630614 env[1645]: 2024-02-09 18:56:43.629 [INFO][3840] k8s.go 591: Teardown processing complete. ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:43.632199 env[1645]: time="2024-02-09T18:56:43.630662928Z" level=info msg="TearDown network for sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\" successfully" Feb 9 18:56:43.632199 env[1645]: time="2024-02-09T18:56:43.630701604Z" level=info msg="StopPodSandbox for \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\" returns successfully" Feb 9 18:56:43.632199 env[1645]: time="2024-02-09T18:56:43.631852187Z" level=info msg="RemovePodSandbox for \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\"" Feb 9 18:56:43.632199 env[1645]: time="2024-02-09T18:56:43.631890524Z" level=info msg="Forcibly stopping sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\"" Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.729 [WARNING][3867] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"98410015-68b6-4dca-814c-0201b00b91f4", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"1be45dd4c16818fd2812b190dda01e2cf3d280af31c0c2a4ca84444faee6a078", Pod:"nginx-deployment-845c78c8b9-lds2q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia4581de6a76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.730 [INFO][3867] k8s.go 578: Cleaning up netns ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.730 [INFO][3867] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" iface="eth0" netns="" Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.730 [INFO][3867] k8s.go 585: Releasing IP address(es) ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.730 [INFO][3867] utils.go 188: Calico CNI releasing IP address ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.804 [INFO][3874] ipam_plugin.go 415: Releasing address using handleID ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" HandleID="k8s-pod-network.7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.804 [INFO][3874] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.811 [INFO][3874] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.830 [WARNING][3874] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" HandleID="k8s-pod-network.7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.832 [INFO][3874] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" HandleID="k8s-pod-network.7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Workload="172.31.20.217-k8s-nginx--deployment--845c78c8b9--lds2q-eth0" Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.835 [INFO][3874] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:43.843479 env[1645]: 2024-02-09 18:56:43.838 [INFO][3867] k8s.go 591: Teardown processing complete. ContainerID="7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d" Feb 9 18:56:43.843479 env[1645]: time="2024-02-09T18:56:43.841127706Z" level=info msg="TearDown network for sandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\" successfully" Feb 9 18:56:43.849752 kubelet[2101]: E0209 18:56:43.849708 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:43.895665 env[1645]: time="2024-02-09T18:56:43.895468343Z" level=info msg="RemovePodSandbox \"7ea2c0a093314f07cbcbe0974b33f5ff2ea6ec6ede4e561c8ea604bd59e42d4d\" returns successfully" Feb 9 18:56:44.284000 audit[3777]: AVC avc: denied { watch } for pid=3777 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_56_30.1341147754/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c203,c478 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c203,c478 tclass=file permissive=0 Feb 9 18:56:44.284000 audit[3777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000eaf7c0 a2=fc6 a3=0 items=0 ppid=3629 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c203,c478 key=(null) Feb 9 18:56:44.300024 kernel: audit: type=1400 audit(1707505004.284:916): avc: denied { watch } for pid=3777 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_56_30.1341147754/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c203,c478 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c203,c478 tclass=file permissive=0 Feb 9 18:56:44.300244 kernel: audit: type=1300 audit(1707505004.284:916): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000eaf7c0 a2=fc6 a3=0 items=0 ppid=3629 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c203,c478 key=(null) Feb 9 18:56:44.300293 kernel: audit: type=1327 audit(1707505004.284:916): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:56:44.284000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:56:44.850016 kubelet[2101]: E0209 18:56:44.849966 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:45.850745 kubelet[2101]: E0209 18:56:45.850701 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:46.851711 kubelet[2101]: E0209 18:56:46.851671 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:47.852542 kubelet[2101]: E0209 18:56:47.852410 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:48.853320 kubelet[2101]: E0209 18:56:48.853270 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:49.854471 kubelet[2101]: E0209 18:56:49.854419 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:50.855220 kubelet[2101]: E0209 18:56:50.855172 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:51.856367 kubelet[2101]: E0209 18:56:51.856147 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:52.856478 kubelet[2101]: E0209 18:56:52.856438 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:53.856951 kubelet[2101]: E0209 18:56:53.856839 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:54.857788 kubelet[2101]: E0209 18:56:54.857682 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:55.858289 kubelet[2101]: E0209 18:56:55.858235 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:56.859083 kubelet[2101]: E0209 18:56:56.859027 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:57.859474 kubelet[2101]: E0209 18:56:57.859433 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:58.860314 kubelet[2101]: E0209 18:56:58.860264 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:59.861434 kubelet[2101]: E0209 18:56:59.861381 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:00.862587 kubelet[2101]: E0209 18:57:00.862535 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:01.278000 audit[3957]: NETFILTER_CFG table=filter:84 family=2 entries=9 op=nft_register_rule pid=3957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.278000 audit[3957]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc3c933160 a2=0 a3=7ffc3c93314c items=0 ppid=2305 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.317270 kernel: audit: type=1325 audit(1707505021.278:917): table=filter:84 family=2 entries=9 op=nft_register_rule pid=3957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.317512 kernel: audit: type=1300 audit(1707505021.278:917): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc3c933160 a2=0 a3=7ffc3c93314c items=0 ppid=2305 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.317580 kernel: audit: type=1327 audit(1707505021.278:917): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:01.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:01.278000 audit[3957]: NETFILTER_CFG table=nat:85 family=2 entries=51 op=nft_register_chain pid=3957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.331403 kernel: audit: type=1325 audit(1707505021.278:918): table=nat:85 family=2 entries=51 op=nft_register_chain pid=3957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.331556 kernel: audit: type=1300 audit(1707505021.278:918): arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7ffc3c933160 a2=0 a3=7ffc3c93314c items=0 ppid=2305 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.278000 audit[3957]: SYSCALL arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7ffc3c933160 a2=0 a3=7ffc3c93314c items=0 ppid=2305 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.351379 kernel: audit: type=1327 audit(1707505021.278:918): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:01.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:01.350000 audit[3959]: NETFILTER_CFG table=filter:86 family=2 entries=8 op=nft_register_rule pid=3959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.361165 kernel: audit: type=1325 audit(1707505021.350:919): table=filter:86 family=2 entries=8 op=nft_register_rule pid=3959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.361332 kernel: audit: type=1300 audit(1707505021.350:919): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd696aa4b0 a2=0 a3=7ffd696aa49c items=0 ppid=2305 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.350000 audit[3959]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd696aa4b0 a2=0 a3=7ffd696aa49c items=0 ppid=2305 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:01.371323 kernel: audit: type=1327 audit(1707505021.350:919): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:01.355000 audit[3959]: NETFILTER_CFG table=nat:87 family=2 entries=58 op=nft_register_chain pid=3959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.376504 kernel: audit: type=1325 audit(1707505021.355:920): table=nat:87 family=2 entries=58 op=nft_register_chain pid=3959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.355000 audit[3959]: SYSCALL arch=c000003e syscall=46 success=yes exit=19604 a0=3 a1=7ffd696aa4b0 a2=0 a3=7ffd696aa49c items=0 ppid=2305 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:01.863580 kubelet[2101]: E0209 18:57:01.863526 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:02.800383 kubelet[2101]: E0209 18:57:02.800330 2101 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:02.864040 kubelet[2101]: E0209 18:57:02.863991 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:03.124283 kubelet[2101]: I0209 18:57:03.123447 2101 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:57:03.133554 systemd[1]: Created slice kubepods-besteffort-pod03791b47_415a_406d_a2ed_f16f63c9f378.slice. Feb 9 18:57:03.264675 kubelet[2101]: I0209 18:57:03.264636 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-14bd8193-7983-40f1-8545-7df74ee68449\" (UniqueName: \"kubernetes.io/nfs/03791b47-415a-406d-a2ed-f16f63c9f378-pvc-14bd8193-7983-40f1-8545-7df74ee68449\") pod \"test-pod-1\" (UID: \"03791b47-415a-406d-a2ed-f16f63c9f378\") " pod="default/test-pod-1" Feb 9 18:57:03.264959 kubelet[2101]: I0209 18:57:03.264926 2101 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sdjzc\" (UniqueName: \"kubernetes.io/projected/03791b47-415a-406d-a2ed-f16f63c9f378-kube-api-access-sdjzc\") pod \"test-pod-1\" (UID: \"03791b47-415a-406d-a2ed-f16f63c9f378\") " pod="default/test-pod-1" Feb 9 18:57:03.446000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.451683 kernel: Failed to create system directory netfs Feb 9 18:57:03.451796 kernel: Failed to create system directory netfs Feb 9 18:57:03.446000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.446000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.453317 kernel: Failed to create system directory netfs Feb 9 18:57:03.453392 kernel: Failed to create system directory netfs Feb 9 18:57:03.446000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.446000 audit[3964]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5608a5ac65e0 a1=153bc a2=5608a4f9b2b0 a3=5 items=0 ppid=1614 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:03.446000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.470322 kernel: Failed to create system directory fscache Feb 9 18:57:03.470419 kernel: Failed to create system directory fscache Feb 9 18:57:03.470446 kernel: Failed to create system directory fscache Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.473682 kernel: Failed to create system directory fscache Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.475733 kernel: Failed to create system directory fscache Feb 9 18:57:03.476001 kernel: Failed to create system directory fscache Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.479493 kernel: Failed to create system directory fscache Feb 9 18:57:03.479560 kernel: Failed to create system directory fscache Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.481922 kernel: Failed to create system directory fscache Feb 9 18:57:03.482005 kernel: Failed to create system directory fscache Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.484434 kernel: Failed to create system directory fscache Feb 9 18:57:03.484555 kernel: Failed to create system directory fscache Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.487300 kernel: Failed to create system directory fscache Feb 9 18:57:03.487658 kernel: Failed to create system directory fscache Feb 9 18:57:03.462000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.491444 kernel: FS-Cache: Loaded Feb 9 18:57:03.462000 audit[3964]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5608a5cdb9c0 a1=4c0fc a2=5608a4f9b2b0 a3=5 items=0 ppid=1614 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:03.462000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.567650 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.567748 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.567775 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.567801 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.567837 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.567860 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.567884 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.567920 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.567945 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.568108 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.568182 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.568210 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.568237 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.568261 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.568288 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.568316 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.568356 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.571692 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.571782 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.574471 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.574556 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.579143 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.579264 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.581455 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.581536 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.583743 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.583803 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.587333 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.587555 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.589755 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.589823 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.592077 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.592145 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.595413 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.595720 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.598786 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.598883 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.601291 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.601361 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.604058 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.604127 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.607079 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.607150 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.609598 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.609835 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.613339 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.613479 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.616637 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.616839 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.626451 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.626572 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.633658 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.633871 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.638797 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.638945 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.642446 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.642560 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.645382 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.645503 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.647650 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.647736 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.649768 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.649840 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.653091 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.653198 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.655163 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.655306 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.658063 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.658116 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.660260 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.660316 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.662281 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.662319 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.664515 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.664583 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.668270 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.668382 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.670748 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.670823 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.672083 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.674941 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.675068 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.677579 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.677799 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.680297 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.680382 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.686369 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.686485 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.689196 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.689309 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.690358 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.691865 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.693901 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.696819 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.698406 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.700249 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.703134 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.703219 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.711813 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.711912 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.713683 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.715285 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.715367 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.717697 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.717755 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.719922 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.720035 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.722443 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.722558 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.724628 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.724723 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.727115 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.727287 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.729608 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.729763 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.732286 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.732380 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.734958 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.735071 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.738401 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.738498 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.743585 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.743690 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.743721 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.746181 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.746325 kernel: Failed to create system directory sunrpc Feb 9 18:57:03.522000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.761592 kernel: RPC: Registered named UNIX socket transport module. Feb 9 18:57:03.761757 kernel: RPC: Registered udp transport module. Feb 9 18:57:03.761786 kernel: RPC: Registered tcp transport module. Feb 9 18:57:03.764261 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 18:57:03.522000 audit[3964]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5608a5d27ad0 a1=1588c4 a2=5608a4f9b2b0 a3=5 items=6 ppid=1614 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:03.522000 audit: CWD cwd="/" Feb 9 18:57:03.522000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:03.522000 audit: PATH item=1 name=(null) inode=25184 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:03.522000 audit: PATH item=2 name=(null) inode=25184 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:03.522000 audit: PATH item=3 name=(null) inode=25185 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:03.522000 audit: PATH item=4 name=(null) inode=25184 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:03.522000 audit: PATH item=5 name=(null) inode=25186 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:03.522000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:57:03.865334 kubelet[2101]: E0209 18:57:03.864779 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.882711 kernel: Failed to create system directory nfs Feb 9 18:57:03.882835 kernel: Failed to create system directory nfs Feb 9 18:57:03.882866 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.887380 kernel: Failed to create system directory nfs Feb 9 18:57:03.887501 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.889862 kernel: Failed to create system directory nfs Feb 9 18:57:03.889988 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.892270 kernel: Failed to create system directory nfs Feb 9 18:57:03.892390 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.895645 kernel: Failed to create system directory nfs Feb 9 18:57:03.895841 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.899360 kernel: Failed to create system directory nfs Feb 9 18:57:03.899461 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.902694 kernel: Failed to create system directory nfs Feb 9 18:57:03.902839 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.905359 kernel: Failed to create system directory nfs Feb 9 18:57:03.905444 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.907737 kernel: Failed to create system directory nfs Feb 9 18:57:03.907803 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.910470 kernel: Failed to create system directory nfs Feb 9 18:57:03.910610 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.913036 kernel: Failed to create system directory nfs Feb 9 18:57:03.913198 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.916507 kernel: Failed to create system directory nfs Feb 9 18:57:03.916600 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.919423 kernel: Failed to create system directory nfs Feb 9 18:57:03.919491 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.922246 kernel: Failed to create system directory nfs Feb 9 18:57:03.922333 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.924891 kernel: Failed to create system directory nfs Feb 9 18:57:03.925022 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.927581 kernel: Failed to create system directory nfs Feb 9 18:57:03.927631 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.931354 kernel: Failed to create system directory nfs Feb 9 18:57:03.931447 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.933815 kernel: Failed to create system directory nfs Feb 9 18:57:03.933868 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.937580 kernel: Failed to create system directory nfs Feb 9 18:57:03.937635 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.942824 kernel: Failed to create system directory nfs Feb 9 18:57:03.942919 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.951134 kernel: Failed to create system directory nfs Feb 9 18:57:03.951249 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.953658 kernel: Failed to create system directory nfs Feb 9 18:57:03.953761 kernel: Failed to create system directory nfs Feb 9 18:57:03.963906 kernel: Failed to create system directory nfs Feb 9 18:57:03.964045 kernel: Failed to create system directory nfs Feb 9 18:57:03.964075 kernel: Failed to create system directory nfs Feb 9 18:57:03.964143 kernel: Failed to create system directory nfs Feb 9 18:57:03.964174 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.966323 kernel: Failed to create system directory nfs Feb 9 18:57:03.966462 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.968498 kernel: Failed to create system directory nfs Feb 9 18:57:03.968628 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.971274 kernel: Failed to create system directory nfs Feb 9 18:57:03.971568 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.976261 kernel: Failed to create system directory nfs Feb 9 18:57:03.976374 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.859000 audit[3964]: AVC avc: denied { confidentiality } for pid=3964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:03.978234 kernel: Failed to create system directory nfs Feb 9 18:57:03.859000 audit[3964]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5608a5eca680 a1=e29dc a2=5608a4f9b2b0 a3=5 items=0 ppid=1614 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:04.001568 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 18:57:03.859000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.102127 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.102220 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.102238 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.104026 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.107293 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.107364 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.109485 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.112471 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.112570 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.115087 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.115156 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.117644 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.117696 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.119945 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.120045 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.122071 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.122136 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.124299 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.124369 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.127060 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.127112 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.129350 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.129397 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.131852 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.132665 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.135490 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.135560 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.138216 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.138286 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.140855 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.140928 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.143064 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.143188 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.145591 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.145642 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.147518 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.149935 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.150032 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.152117 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.152195 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.154178 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.156537 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.156607 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.158749 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.158829 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.160854 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.160901 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.162905 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.162979 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.165594 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.165783 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.168411 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.168511 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.170806 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.170890 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.173365 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.173460 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.175334 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.175389 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.177721 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.177790 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.179701 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.179741 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.182049 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.182100 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.184213 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.184259 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.187565 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.187638 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.188597 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.189629 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.190587 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.191906 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.193384 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.194994 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.196072 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.197314 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.198521 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.199710 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.202202 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.208626 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.211081 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.213409 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.214978 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.235104 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.235336 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.235413 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.237998 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.239489 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.239566 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.241420 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.241498 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.243416 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.243496 kernel: Failed to create system directory nfs4 Feb 9 18:57:04.067000 audit[3969]: AVC avc: denied { confidentiality } for pid=3969 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.445461 kernel: NFS: Registering the id_resolver key type Feb 9 18:57:04.445751 kernel: Key type id_resolver registered Feb 9 18:57:04.445781 kernel: Key type id_legacy registered Feb 9 18:57:04.067000 audit[3969]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f3d23e97010 a1=1d3cc4 a2=5570743d72b0 a3=5 items=0 ppid=1614 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:04.067000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.463498 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.463539 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.465671 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.465752 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.470168 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.476832 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.476895 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.476922 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.479132 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.479201 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.482132 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.482205 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.485771 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.486489 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.489979 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.490056 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.492085 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.493252 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.494416 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.497090 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.497200 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.499775 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.499898 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.502716 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.502786 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.457000 audit[3970]: AVC avc: denied { confidentiality } for pid=3970 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:04.505190 kernel: Failed to create system directory rpcgss Feb 9 18:57:04.457000 audit[3970]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f235da0b010 a1=4f524 a2=5634c6d1c2b0 a3=5 items=0 ppid=1614 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:04.457000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 18:57:04.535108 nfsidmap[3978]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Feb 9 18:57:04.540361 nfsidmap[3979]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Feb 9 18:57:04.552000 audit[1837]: AVC avc: denied { watch_reads } for pid=1837 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:04.552000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5563cd7a99d0 a2=10 a3=c9bb87f27eed8d33 items=0 ppid=1 pid=1837 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:04.552000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:57:04.552000 audit[1837]: AVC avc: denied { watch_reads } for pid=1837 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:04.552000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5563cd7a99d0 a2=10 a3=c9bb87f27eed8d33 items=0 ppid=1 pid=1837 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:04.552000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:57:04.552000 audit[1837]: AVC avc: denied { watch_reads } for pid=1837 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:04.552000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5563cd7a99d0 a2=10 a3=c9bb87f27eed8d33 items=0 ppid=1 pid=1837 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:04.552000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:57:04.553000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:04.553000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:04.553000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:04.641334 env[1645]: time="2024-02-09T18:57:04.641283346Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:03791b47-415a-406d-a2ed-f16f63c9f378,Namespace:default,Attempt:0,}" Feb 9 18:57:04.866019 kubelet[2101]: E0209 18:57:04.865951 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:04.879315 (udev-worker)[3971]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:57:04.885087 systemd-networkd[1453]: cali5ec59c6bf6e: Link UP Feb 9 18:57:04.890564 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:57:04.890849 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 18:57:04.892308 systemd-networkd[1453]: cali5ec59c6bf6e: Gained carrier Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.742 [INFO][3980] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.20.217-k8s-test--pod--1-eth0 default 03791b47-415a-406d-a2ed-f16f63c9f378 1277 0 2024-02-09 18:56:32 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.20.217 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.20.217-k8s-test--pod--1-" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.743 [INFO][3980] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.20.217-k8s-test--pod--1-eth0" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.810 [INFO][3992] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" HandleID="k8s-pod-network.774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Workload="172.31.20.217-k8s-test--pod--1-eth0" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.823 [INFO][3992] ipam_plugin.go 268: Auto assigning IP ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" HandleID="k8s-pod-network.774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Workload="172.31.20.217-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027c8a0), Attrs:map[string]string{"namespace":"default", "node":"172.31.20.217", "pod":"test-pod-1", "timestamp":"2024-02-09 18:57:04.810417639 +0000 UTC"}, Hostname:"172.31.20.217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.823 [INFO][3992] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.824 [INFO][3992] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.824 [INFO][3992] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.20.217' Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.827 [INFO][3992] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" host="172.31.20.217" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.832 [INFO][3992] ipam.go 372: Looking up existing affinities for host host="172.31.20.217" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.841 [INFO][3992] ipam.go 489: Trying affinity for 192.168.99.0/26 host="172.31.20.217" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.849 [INFO][3992] ipam.go 155: Attempting to load block cidr=192.168.99.0/26 host="172.31.20.217" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.855 [INFO][3992] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.0/26 host="172.31.20.217" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.855 [INFO][3992] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.0/26 handle="k8s-pod-network.774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" host="172.31.20.217" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.857 [INFO][3992] ipam.go 1682: Creating new handle: k8s-pod-network.774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.865 [INFO][3992] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.0/26 handle="k8s-pod-network.774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" host="172.31.20.217" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.874 [INFO][3992] ipam.go 1216: Successfully claimed IPs: [192.168.99.5/26] block=192.168.99.0/26 handle="k8s-pod-network.774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" host="172.31.20.217" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.874 [INFO][3992] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.5/26] handle="k8s-pod-network.774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" host="172.31.20.217" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.874 [INFO][3992] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.874 [INFO][3992] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.5/26] IPv6=[] ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" HandleID="k8s-pod-network.774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Workload="172.31.20.217-k8s-test--pod--1-eth0" Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.876 [INFO][3980] k8s.go 385: Populated endpoint ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.20.217-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"03791b47-415a-406d-a2ed-f16f63c9f378", ResourceVersion:"1277", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:57:04.916049 env[1645]: 2024-02-09 18:57:04.876 [INFO][3980] k8s.go 386: Calico CNI using IPs: [192.168.99.5/32] ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.20.217-k8s-test--pod--1-eth0" Feb 9 18:57:04.926458 env[1645]: 2024-02-09 18:57:04.876 [INFO][3980] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.20.217-k8s-test--pod--1-eth0" Feb 9 18:57:04.926458 env[1645]: 2024-02-09 18:57:04.894 [INFO][3980] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.20.217-k8s-test--pod--1-eth0" Feb 9 18:57:04.926458 env[1645]: 2024-02-09 18:57:04.895 [INFO][3980] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.20.217-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.20.217-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"03791b47-415a-406d-a2ed-f16f63c9f378", ResourceVersion:"1277", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.20.217", ContainerID:"774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d2:3c:36:49:41:aa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:57:04.926458 env[1645]: 2024-02-09 18:57:04.908 [INFO][3980] k8s.go 491: Wrote updated endpoint to datastore ContainerID="774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.20.217-k8s-test--pod--1-eth0" Feb 9 18:57:04.953000 audit[4017]: NETFILTER_CFG table=filter:88 family=2 entries=42 op=nft_register_chain pid=4017 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:57:04.956201 env[1645]: time="2024-02-09T18:57:04.955933670Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:57:04.956201 env[1645]: time="2024-02-09T18:57:04.956071143Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:57:04.956201 env[1645]: time="2024-02-09T18:57:04.956104914Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:57:04.956803 env[1645]: time="2024-02-09T18:57:04.956729043Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d pid=4021 runtime=io.containerd.runc.v2 Feb 9 18:57:04.953000 audit[4017]: SYSCALL arch=c000003e syscall=46 success=yes exit=20268 a0=3 a1=7ffee98d2b40 a2=0 a3=7ffee98d2b2c items=0 ppid=2979 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:04.953000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:57:05.004633 systemd[1]: Started cri-containerd-774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d.scope. Feb 9 18:57:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.022000 audit: BPF prog-id=134 op=LOAD Feb 9 18:57:05.023000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.023000 audit[4030]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4021 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:05.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343234356436343131616361623933333135633138306337383565 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4021 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:05.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343234356436343131616361623933333135633138306337383565 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit: BPF prog-id=135 op=LOAD Feb 9 18:57:05.025000 audit[4030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024eb0 items=0 ppid=4021 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:05.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343234356436343131616361623933333135633138306337383565 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.025000 audit: BPF prog-id=136 op=LOAD Feb 9 18:57:05.025000 audit[4030]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024ef8 items=0 ppid=4021 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:05.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343234356436343131616361623933333135633138306337383565 Feb 9 18:57:05.027000 audit: BPF prog-id=136 op=UNLOAD Feb 9 18:57:05.027000 audit: BPF prog-id=135 op=UNLOAD Feb 9 18:57:05.027000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.027000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.027000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.027000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.027000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.027000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.027000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.027000 audit[4030]: AVC avc: denied { perfmon } for pid=4030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.027000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.027000 audit[4030]: AVC avc: denied { bpf } for pid=4030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.027000 audit: BPF prog-id=137 op=LOAD Feb 9 18:57:05.027000 audit[4030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025308 items=0 ppid=4021 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:05.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737343234356436343131616361623933333135633138306337383565 Feb 9 18:57:05.071223 env[1645]: time="2024-02-09T18:57:05.071148761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:03791b47-415a-406d-a2ed-f16f63c9f378,Namespace:default,Attempt:0,} returns sandbox id \"774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d\"" Feb 9 18:57:05.074805 env[1645]: time="2024-02-09T18:57:05.074765216Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 18:57:05.456800 env[1645]: time="2024-02-09T18:57:05.456744944Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:05.460804 env[1645]: time="2024-02-09T18:57:05.460754904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:05.463265 env[1645]: time="2024-02-09T18:57:05.463228118Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:05.472427 env[1645]: time="2024-02-09T18:57:05.472379323Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:05.474229 env[1645]: time="2024-02-09T18:57:05.474051661Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 18:57:05.482273 env[1645]: time="2024-02-09T18:57:05.482223442Z" level=info msg="CreateContainer within sandbox \"774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 18:57:05.516350 env[1645]: time="2024-02-09T18:57:05.516280447Z" level=info msg="CreateContainer within sandbox \"774245d6411acab93315c180c785ee3810cb2350130335205ff7e6e28420cb3d\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"6bf066ac9802186594849126e5b56fe16f9ef1ceb974972c4839b532f121f2e2\"" Feb 9 18:57:05.516986 env[1645]: time="2024-02-09T18:57:05.516949743Z" level=info msg="StartContainer for \"6bf066ac9802186594849126e5b56fe16f9ef1ceb974972c4839b532f121f2e2\"" Feb 9 18:57:05.577390 systemd[1]: run-containerd-runc-k8s.io-6bf066ac9802186594849126e5b56fe16f9ef1ceb974972c4839b532f121f2e2-runc.nEVo1U.mount: Deactivated successfully. Feb 9 18:57:05.586189 systemd[1]: Started cri-containerd-6bf066ac9802186594849126e5b56fe16f9ef1ceb974972c4839b532f121f2e2.scope. Feb 9 18:57:05.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.611000 audit: BPF prog-id=138 op=LOAD Feb 9 18:57:05.613000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.613000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4021 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:05.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662663036366163393830323138363539343834393132366535623536 Feb 9 18:57:05.613000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.613000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4021 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:05.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662663036366163393830323138363539343834393132366535623536 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit: BPF prog-id=139 op=LOAD Feb 9 18:57:05.614000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009b4b0 items=0 ppid=4021 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:05.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662663036366163393830323138363539343834393132366535623536 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit: BPF prog-id=140 op=LOAD Feb 9 18:57:05.614000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009b4f8 items=0 ppid=4021 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:05.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662663036366163393830323138363539343834393132366535623536 Feb 9 18:57:05.614000 audit: BPF prog-id=140 op=UNLOAD Feb 9 18:57:05.614000 audit: BPF prog-id=139 op=UNLOAD Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:05.614000 audit: BPF prog-id=141 op=LOAD Feb 9 18:57:05.614000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009b908 items=0 ppid=4021 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:05.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662663036366163393830323138363539343834393132366535623536 Feb 9 18:57:05.643978 env[1645]: time="2024-02-09T18:57:05.643928970Z" level=info msg="StartContainer for \"6bf066ac9802186594849126e5b56fe16f9ef1ceb974972c4839b532f121f2e2\" returns successfully" Feb 9 18:57:05.867082 kubelet[2101]: E0209 18:57:05.867038 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:06.445469 kubelet[2101]: I0209 18:57:06.445429 2101 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=34.044540654 podCreationTimestamp="2024-02-09 18:56:32 +0000 UTC" firstStartedPulling="2024-02-09 18:57:05.074003471 +0000 UTC m=+82.890861103" lastFinishedPulling="2024-02-09 18:57:05.474840562 +0000 UTC m=+83.291698202" observedRunningTime="2024-02-09 18:57:06.441022426 +0000 UTC m=+84.257880070" watchObservedRunningTime="2024-02-09 18:57:06.445377753 +0000 UTC m=+84.262235394" Feb 9 18:57:06.518604 systemd-networkd[1453]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 18:57:06.868252 kubelet[2101]: E0209 18:57:06.868199 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:07.868635 kubelet[2101]: E0209 18:57:07.868581 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:08.869655 kubelet[2101]: E0209 18:57:08.869605 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:09.870756 kubelet[2101]: E0209 18:57:09.870703 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:10.871462 kubelet[2101]: E0209 18:57:10.871408 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:11.872528 kubelet[2101]: E0209 18:57:11.872364 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:12.873727 kubelet[2101]: E0209 18:57:12.873622 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:13.874296 kubelet[2101]: E0209 18:57:13.874242 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:14.874823 kubelet[2101]: E0209 18:57:14.874692 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:15.875808 kubelet[2101]: E0209 18:57:15.875697 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:16.876782 kubelet[2101]: E0209 18:57:16.876728 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:17.876930 kubelet[2101]: E0209 18:57:17.876876 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:18.877451 kubelet[2101]: E0209 18:57:18.877402 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:19.878149 kubelet[2101]: E0209 18:57:19.878101 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:20.878510 kubelet[2101]: E0209 18:57:20.878460 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:21.878968 kubelet[2101]: E0209 18:57:21.878922 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:22.799753 kubelet[2101]: E0209 18:57:22.799709 2101 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:22.879187 kubelet[2101]: E0209 18:57:22.879132 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:23.880270 kubelet[2101]: E0209 18:57:23.880216 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:24.880789 kubelet[2101]: E0209 18:57:24.880749 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:25.881408 kubelet[2101]: E0209 18:57:25.881359 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:25.908990 kubelet[2101]: E0209 18:57:25.908919 2101 kubelet_node_status.go:540] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"NetworkUnavailable\\\"},{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T18:57:15Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T18:57:15Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T18:57:15Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T18:57:15Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754\\\",\\\"ghcr.io/flatcar/calico/node:v3.27.0\\\"],\\\"sizeBytes\\\":116702084},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4\\\",\\\"ghcr.io/flatcar/calico/cni:v3.27.0\\\"],\\\"sizeBytes\\\":94672983},{\\\"names\\\":[\\\"registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d\\\",\\\"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\\\"],\\\"sizeBytes\\\":91036984},{\\\"names\\\":[\\\"ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6\\\",\\\"ghcr.io/flatcar/nginx:latest\\\"],\\\"sizeBytes\\\":57035507},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26\\\",\\\"ghcr.io/flatcar/calico/apiserver:v3.27.0\\\"],\\\"sizeBytes\\\":40343255},{\\\"names\\\":[\\\"registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88\\\",\\\"registry.k8s.io/kube-proxy:v1.27.10\\\"],\\\"sizeBytes\\\":25732783},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a\\\",\\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\\\"],\\\"sizeBytes\\\":11155216},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738\\\",\\\"ghcr.io/flatcar/calico/csi:v3.27.0\\\"],\\\"sizeBytes\\\":8740388},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e\\\",\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\\\"],\\\"sizeBytes\\\":7592599},{\\\"names\\\":[\\\"registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db\\\",\\\"registry.k8s.io/pause:3.6\\\"],\\\"sizeBytes\\\":301773}]}}\" for node \"172.31.20.217\": Patch \"https://172.31.21.122:6443/api/v1/nodes/172.31.20.217/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:57:26.207497 kubelet[2101]: E0209 18:57:26.207367 2101 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.20.217?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:57:26.882219 kubelet[2101]: E0209 18:57:26.882166 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:27.883328 kubelet[2101]: E0209 18:57:27.883275 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:27.967421 systemd[1]: run-containerd-runc-k8s.io-ac878e2b9d24a162edf11641916e44faaae0288053c191946ba371552fdca41d-runc.g45ME6.mount: Deactivated successfully. Feb 9 18:57:28.883762 kubelet[2101]: E0209 18:57:28.883713 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:29.884281 kubelet[2101]: E0209 18:57:29.884228 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:30.885186 kubelet[2101]: E0209 18:57:30.885145 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:31.039374 systemd[1]: run-containerd-runc-k8s.io-e0c513b9875d6dfd1d4b21180ca8bac9d14301bd210978193cc950c3d2a4a3b6-runc.AaPHqE.mount: Deactivated successfully. Feb 9 18:57:31.886430 kubelet[2101]: E0209 18:57:31.886393 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:32.887122 kubelet[2101]: E0209 18:57:32.887072 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:33.887462 kubelet[2101]: E0209 18:57:33.887418 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:34.888214 kubelet[2101]: E0209 18:57:34.888161 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:35.888887 kubelet[2101]: E0209 18:57:35.888835 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:35.909306 kubelet[2101]: E0209 18:57:35.909265 2101 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.20.217\": Get \"https://172.31.21.122:6443/api/v1/nodes/172.31.20.217?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:57:36.208912 kubelet[2101]: E0209 18:57:36.208576 2101 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.20.217?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:57:36.889907 kubelet[2101]: E0209 18:57:36.889853 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:37.890065 kubelet[2101]: E0209 18:57:37.890015 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:38.891008 kubelet[2101]: E0209 18:57:38.890955 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:39.891156 kubelet[2101]: E0209 18:57:39.891104 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:40.891262 kubelet[2101]: E0209 18:57:40.891208 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:41.892388 kubelet[2101]: E0209 18:57:41.892228 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:42.800589 kubelet[2101]: E0209 18:57:42.800550 2101 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:42.892784 kubelet[2101]: E0209 18:57:42.892734 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:43.894036 kubelet[2101]: E0209 18:57:43.893982 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:44.289000 audit[3777]: AVC avc: denied { watch } for pid=3777 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_56_30.1341147754/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c203,c478 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c203,c478 tclass=file permissive=0 Feb 9 18:57:44.291907 kernel: kauditd_printk_skb: 473 callbacks suppressed Feb 9 18:57:44.291994 kernel: audit: type=1400 audit(1707505064.289:970): avc: denied { watch } for pid=3777 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_56_30.1341147754/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c203,c478 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c203,c478 tclass=file permissive=0 Feb 9 18:57:44.289000 audit[3777]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c782a0 a2=fc6 a3=0 items=0 ppid=3629 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c203,c478 key=(null) Feb 9 18:57:44.304758 kernel: audit: type=1300 audit(1707505064.289:970): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c782a0 a2=fc6 a3=0 items=0 ppid=3629 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c203,c478 key=(null) Feb 9 18:57:44.304889 kernel: audit: type=1327 audit(1707505064.289:970): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:57:44.289000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:57:44.894355 kubelet[2101]: E0209 18:57:44.894278 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:45.895550 kubelet[2101]: E0209 18:57:45.895404 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:45.909815 kubelet[2101]: E0209 18:57:45.909778 2101 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.20.217\": Get \"https://172.31.21.122:6443/api/v1/nodes/172.31.20.217?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:57:46.209230 kubelet[2101]: E0209 18:57:46.209120 2101 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.20.217?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:57:46.895943 kubelet[2101]: E0209 18:57:46.895887 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:47.896440 kubelet[2101]: E0209 18:57:47.896385 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:48.896764 kubelet[2101]: E0209 18:57:48.896713 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:49.897741 kubelet[2101]: E0209 18:57:49.897692 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:50.898090 kubelet[2101]: E0209 18:57:50.898049 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:51.898226 kubelet[2101]: E0209 18:57:51.898177 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:52.899032 kubelet[2101]: E0209 18:57:52.898991 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:53.899789 kubelet[2101]: E0209 18:57:53.899751 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:54.749143 kubelet[2101]: E0209 18:57:54.748795 2101 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.20.217?timeout=10s\": unexpected EOF" Feb 9 18:57:54.749681 kubelet[2101]: E0209 18:57:54.749657 2101 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.20.217?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused" Feb 9 18:57:54.749805 kubelet[2101]: I0209 18:57:54.749697 2101 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Feb 9 18:57:54.751602 kubelet[2101]: E0209 18:57:54.751563 2101 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.20.217?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused" interval="200ms" Feb 9 18:57:54.900817 kubelet[2101]: E0209 18:57:54.900776 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:54.953648 kubelet[2101]: E0209 18:57:54.953611 2101 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.20.217?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused" interval="400ms" Feb 9 18:57:55.354620 kubelet[2101]: E0209 18:57:55.354582 2101 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.20.217?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused" interval="800ms" Feb 9 18:57:55.750518 kubelet[2101]: E0209 18:57:55.750303 2101 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.20.217\": Get \"https://172.31.21.122:6443/api/v1/nodes/172.31.20.217?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused - error from a previous attempt: unexpected EOF" Feb 9 18:57:55.751016 kubelet[2101]: E0209 18:57:55.750995 2101 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.20.217\": Get \"https://172.31.21.122:6443/api/v1/nodes/172.31.20.217?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused" Feb 9 18:57:55.751320 kubelet[2101]: E0209 18:57:55.751019 2101 kubelet_node_status.go:527] "Unable to update node status" err="update node status exceeds retry count" Feb 9 18:57:55.901196 kubelet[2101]: E0209 18:57:55.901143 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:56.901374 kubelet[2101]: E0209 18:57:56.901321 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:57.902085 kubelet[2101]: E0209 18:57:57.902032 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:57.942177 systemd[1]: run-containerd-runc-k8s.io-ac878e2b9d24a162edf11641916e44faaae0288053c191946ba371552fdca41d-runc.H2of1W.mount: Deactivated successfully. Feb 9 18:57:58.902859 kubelet[2101]: E0209 18:57:58.902813 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:59.903958 kubelet[2101]: E0209 18:57:59.903893 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:58:00.904411 kubelet[2101]: E0209 18:58:00.904332 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:58:01.027887 systemd[1]: run-containerd-runc-k8s.io-e0c513b9875d6dfd1d4b21180ca8bac9d14301bd210978193cc950c3d2a4a3b6-runc.lVpV8D.mount: Deactivated successfully. Feb 9 18:58:01.905036 kubelet[2101]: E0209 18:58:01.904944 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:58:02.800136 kubelet[2101]: E0209 18:58:02.800084 2101 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:58:02.905684 kubelet[2101]: E0209 18:58:02.905630 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:58:03.906177 kubelet[2101]: E0209 18:58:03.906127 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:58:04.907307 kubelet[2101]: E0209 18:58:04.907255 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:58:05.907664 kubelet[2101]: E0209 18:58:05.907614 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:58:06.155410 kubelet[2101]: E0209 18:58:06.155368 2101 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.20.217?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Feb 9 18:58:06.908656 kubelet[2101]: E0209 18:58:06.908606 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:58:07.909113 kubelet[2101]: E0209 18:58:07.909064 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:58:08.909642 kubelet[2101]: E0209 18:58:08.909595 2101 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"