Feb 9 19:01:09.150875 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:01:09.150909 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:01:09.150925 kernel: BIOS-provided physical RAM map: Feb 9 19:01:09.150936 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 9 19:01:09.150947 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 9 19:01:09.150958 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 9 19:01:09.150975 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Feb 9 19:01:09.150987 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Feb 9 19:01:09.150999 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Feb 9 19:01:09.151010 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 9 19:01:09.151022 kernel: NX (Execute Disable) protection: active Feb 9 19:01:09.151050 kernel: SMBIOS 2.7 present. Feb 9 19:01:09.151061 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Feb 9 19:01:09.151069 kernel: Hypervisor detected: KVM Feb 9 19:01:09.151083 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:01:09.151092 kernel: kvm-clock: cpu 0, msr 45faa001, primary cpu clock Feb 9 19:01:09.151102 kernel: kvm-clock: using sched offset of 7785754099 cycles Feb 9 19:01:09.151114 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:01:09.151125 kernel: tsc: Detected 2499.998 MHz processor Feb 9 19:01:09.151136 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:01:09.151150 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:01:09.151161 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Feb 9 19:01:09.151171 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:01:09.151183 kernel: Using GB pages for direct mapping Feb 9 19:01:09.151195 kernel: ACPI: Early table checksum verification disabled Feb 9 19:01:09.151207 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Feb 9 19:01:09.151219 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Feb 9 19:01:09.152122 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 9 19:01:09.152138 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Feb 9 19:01:09.152156 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Feb 9 19:01:09.152168 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 9 19:01:09.152180 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 9 19:01:09.152192 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Feb 9 19:01:09.152204 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 9 19:01:09.152218 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Feb 9 19:01:09.152229 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Feb 9 19:01:09.152241 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 9 19:01:09.152256 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Feb 9 19:01:09.152266 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Feb 9 19:01:09.152279 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Feb 9 19:01:09.152297 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Feb 9 19:01:09.152312 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Feb 9 19:01:09.152327 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Feb 9 19:01:09.152342 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Feb 9 19:01:09.152359 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Feb 9 19:01:09.152374 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Feb 9 19:01:09.152389 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Feb 9 19:01:09.152401 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:01:09.152416 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:01:09.152432 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Feb 9 19:01:09.152446 kernel: NUMA: Initialized distance table, cnt=1 Feb 9 19:01:09.152459 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Feb 9 19:01:09.152478 kernel: Zone ranges: Feb 9 19:01:09.152491 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:01:09.152504 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Feb 9 19:01:09.152516 kernel: Normal empty Feb 9 19:01:09.152529 kernel: Movable zone start for each node Feb 9 19:01:09.152542 kernel: Early memory node ranges Feb 9 19:01:09.152555 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 9 19:01:09.152568 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Feb 9 19:01:09.152581 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Feb 9 19:01:09.152597 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:01:09.152611 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 9 19:01:09.152625 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Feb 9 19:01:09.152640 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 19:01:09.152654 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:01:09.152668 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Feb 9 19:01:09.152682 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:01:09.152695 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:01:09.152706 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:01:09.152746 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:01:09.152761 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:01:09.152775 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 19:01:09.152789 kernel: TSC deadline timer available Feb 9 19:01:09.152802 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:01:09.152816 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Feb 9 19:01:09.152831 kernel: Booting paravirtualized kernel on KVM Feb 9 19:01:09.152845 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:01:09.152861 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:01:09.152875 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:01:09.152890 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:01:09.152903 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:01:09.152918 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Feb 9 19:01:09.152940 kernel: kvm-guest: PV spinlocks enabled Feb 9 19:01:09.152954 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:01:09.152968 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Feb 9 19:01:09.152982 kernel: Policy zone: DMA32 Feb 9 19:01:09.152999 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:01:09.153019 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:01:09.153048 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 19:01:09.153063 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:01:09.153077 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:01:09.153093 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved) Feb 9 19:01:09.153107 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:01:09.153121 kernel: Kernel/User page tables isolation: enabled Feb 9 19:01:09.153136 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:01:09.153153 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:01:09.153167 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:01:09.153181 kernel: rcu: RCU event tracing is enabled. Feb 9 19:01:09.153195 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:01:09.153211 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:01:09.153225 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:01:09.153240 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:01:09.153254 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:01:09.153269 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 19:01:09.153286 kernel: random: crng init done Feb 9 19:01:09.153300 kernel: Console: colour VGA+ 80x25 Feb 9 19:01:09.153314 kernel: printk: console [ttyS0] enabled Feb 9 19:01:09.153329 kernel: ACPI: Core revision 20210730 Feb 9 19:01:09.153343 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Feb 9 19:01:09.153359 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:01:09.153373 kernel: x2apic enabled Feb 9 19:01:09.153387 kernel: Switched APIC routing to physical x2apic. Feb 9 19:01:09.153401 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Feb 9 19:01:09.153419 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Feb 9 19:01:09.153434 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 19:01:09.153448 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 19:01:09.153461 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:01:09.153486 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 19:01:09.153504 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:01:09.153519 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:01:09.153534 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 9 19:01:09.153549 kernel: RETBleed: Vulnerable Feb 9 19:01:09.153564 kernel: Speculative Store Bypass: Vulnerable Feb 9 19:01:09.153580 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:01:09.153596 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:01:09.153611 kernel: GDS: Unknown: Dependent on hypervisor status Feb 9 19:01:09.153626 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:01:09.153643 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:01:09.153658 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:01:09.153673 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 19:01:09.153689 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 19:01:09.153703 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 9 19:01:09.153719 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 9 19:01:09.153733 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 9 19:01:09.153748 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Feb 9 19:01:09.153763 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:01:09.153779 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 19:01:09.153795 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 19:01:09.153810 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Feb 9 19:01:09.153824 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Feb 9 19:01:09.153840 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Feb 9 19:01:09.153856 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Feb 9 19:01:09.153872 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Feb 9 19:01:09.153888 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:01:09.153907 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:01:09.153922 kernel: LSM: Security Framework initializing Feb 9 19:01:09.153936 kernel: SELinux: Initializing. Feb 9 19:01:09.153952 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 19:01:09.153967 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 19:01:09.153982 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 9 19:01:09.153997 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 9 19:01:09.154012 kernel: signal: max sigframe size: 3632 Feb 9 19:01:09.154028 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:01:09.154084 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:01:09.154103 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:01:09.154118 kernel: x86: Booting SMP configuration: Feb 9 19:01:09.154133 kernel: .... node #0, CPUs: #1 Feb 9 19:01:09.154148 kernel: kvm-clock: cpu 1, msr 45faa041, secondary cpu clock Feb 9 19:01:09.154163 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Feb 9 19:01:09.154178 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 9 19:01:09.154194 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:01:09.154209 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:01:09.154225 kernel: smpboot: Max logical packages: 1 Feb 9 19:01:09.154243 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Feb 9 19:01:09.154259 kernel: devtmpfs: initialized Feb 9 19:01:09.154274 kernel: x86/mm: Memory block size: 128MB Feb 9 19:01:09.154289 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:01:09.154304 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:01:09.154398 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:01:09.154414 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:01:09.154429 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:01:09.154444 kernel: audit: type=2000 audit(1707505267.523:1): state=initialized audit_enabled=0 res=1 Feb 9 19:01:09.154462 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:01:09.154478 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:01:09.154493 kernel: cpuidle: using governor menu Feb 9 19:01:09.154509 kernel: ACPI: bus type PCI registered Feb 9 19:01:09.154525 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:01:09.154541 kernel: dca service started, version 1.12.1 Feb 9 19:01:09.154557 kernel: PCI: Using configuration type 1 for base access Feb 9 19:01:09.154573 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:01:09.154590 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:01:09.154610 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:01:09.154626 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:01:09.154641 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:01:09.154656 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:01:09.154672 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:01:09.154687 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:01:09.154702 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:01:09.154717 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:01:09.154732 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 9 19:01:09.154751 kernel: ACPI: Interpreter enabled Feb 9 19:01:09.154765 kernel: ACPI: PM: (supports S0 S5) Feb 9 19:01:09.154780 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:01:09.154796 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:01:09.154811 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 9 19:01:09.154826 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:01:09.155044 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:01:09.155193 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 19:01:09.155218 kernel: acpiphp: Slot [3] registered Feb 9 19:01:09.155234 kernel: acpiphp: Slot [4] registered Feb 9 19:01:09.155249 kernel: acpiphp: Slot [5] registered Feb 9 19:01:09.155264 kernel: acpiphp: Slot [6] registered Feb 9 19:01:09.155279 kernel: acpiphp: Slot [7] registered Feb 9 19:01:09.155294 kernel: acpiphp: Slot [8] registered Feb 9 19:01:09.155309 kernel: acpiphp: Slot [9] registered Feb 9 19:01:09.155324 kernel: acpiphp: Slot [10] registered Feb 9 19:01:09.155339 kernel: acpiphp: Slot [11] registered Feb 9 19:01:09.155357 kernel: acpiphp: Slot [12] registered Feb 9 19:01:09.155372 kernel: acpiphp: Slot [13] registered Feb 9 19:01:09.155387 kernel: acpiphp: Slot [14] registered Feb 9 19:01:09.155402 kernel: acpiphp: Slot [15] registered Feb 9 19:01:09.155418 kernel: acpiphp: Slot [16] registered Feb 9 19:01:09.155434 kernel: acpiphp: Slot [17] registered Feb 9 19:01:09.155450 kernel: acpiphp: Slot [18] registered Feb 9 19:01:09.155466 kernel: acpiphp: Slot [19] registered Feb 9 19:01:09.155482 kernel: acpiphp: Slot [20] registered Feb 9 19:01:09.155500 kernel: acpiphp: Slot [21] registered Feb 9 19:01:09.155515 kernel: acpiphp: Slot [22] registered Feb 9 19:01:09.155531 kernel: acpiphp: Slot [23] registered Feb 9 19:01:09.155547 kernel: acpiphp: Slot [24] registered Feb 9 19:01:09.155564 kernel: acpiphp: Slot [25] registered Feb 9 19:01:09.155579 kernel: acpiphp: Slot [26] registered Feb 9 19:01:09.155594 kernel: acpiphp: Slot [27] registered Feb 9 19:01:09.155609 kernel: acpiphp: Slot [28] registered Feb 9 19:01:09.155624 kernel: acpiphp: Slot [29] registered Feb 9 19:01:09.155639 kernel: acpiphp: Slot [30] registered Feb 9 19:01:09.155656 kernel: acpiphp: Slot [31] registered Feb 9 19:01:09.155672 kernel: PCI host bridge to bus 0000:00 Feb 9 19:01:09.155804 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:01:09.155924 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:01:09.156051 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:01:09.156165 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 9 19:01:09.156275 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:01:09.156418 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:01:09.156552 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 19:01:09.156686 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Feb 9 19:01:09.156817 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 19:01:09.156954 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 9 19:01:09.157088 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Feb 9 19:01:09.157210 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Feb 9 19:01:09.157334 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Feb 9 19:01:09.157455 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Feb 9 19:01:09.157625 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Feb 9 19:01:09.157766 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Feb 9 19:01:09.157902 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 16601 usecs Feb 9 19:01:09.158087 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Feb 9 19:01:09.158226 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Feb 9 19:01:09.158455 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 9 19:01:09.158596 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 19:01:09.158742 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 9 19:01:09.158881 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Feb 9 19:01:09.159023 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 9 19:01:09.159212 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Feb 9 19:01:09.159237 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:01:09.159252 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:01:09.159266 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:01:09.159281 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:01:09.159296 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:01:09.159310 kernel: iommu: Default domain type: Translated Feb 9 19:01:09.159325 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:01:09.159458 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Feb 9 19:01:09.159590 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 19:01:09.159726 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Feb 9 19:01:09.159744 kernel: vgaarb: loaded Feb 9 19:01:09.159759 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:01:09.159774 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:01:09.159789 kernel: PTP clock support registered Feb 9 19:01:09.159804 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:01:09.159819 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:01:09.159834 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 9 19:01:09.159851 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Feb 9 19:01:09.159865 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 19:01:09.159880 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Feb 9 19:01:09.159895 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:01:09.159909 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:01:09.159924 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:01:09.159939 kernel: pnp: PnP ACPI init Feb 9 19:01:09.159954 kernel: pnp: PnP ACPI: found 5 devices Feb 9 19:01:09.159969 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:01:09.159986 kernel: NET: Registered PF_INET protocol family Feb 9 19:01:09.160000 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 19:01:09.160016 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 9 19:01:09.160031 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:01:09.160057 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:01:09.160071 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 19:01:09.160086 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 9 19:01:09.160100 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 19:01:09.160115 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 19:01:09.160133 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:01:09.160147 kernel: NET: Registered PF_XDP protocol family Feb 9 19:01:09.160276 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:01:09.160399 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:01:09.160517 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:01:09.160637 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 9 19:01:09.160771 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:01:09.160906 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 19:01:09.160928 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:01:09.160951 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:01:09.160965 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Feb 9 19:01:09.160979 kernel: clocksource: Switched to clocksource tsc Feb 9 19:01:09.160994 kernel: Initialise system trusted keyrings Feb 9 19:01:09.161008 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 9 19:01:09.161023 kernel: Key type asymmetric registered Feb 9 19:01:09.170098 kernel: Asymmetric key parser 'x509' registered Feb 9 19:01:09.170131 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:01:09.170149 kernel: io scheduler mq-deadline registered Feb 9 19:01:09.170163 kernel: io scheduler kyber registered Feb 9 19:01:09.170178 kernel: io scheduler bfq registered Feb 9 19:01:09.170194 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:01:09.170208 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:01:09.170224 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:01:09.170239 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:01:09.170253 kernel: i8042: Warning: Keylock active Feb 9 19:01:09.170271 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:01:09.170286 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:01:09.170475 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 9 19:01:09.170596 kernel: rtc_cmos 00:00: registered as rtc0 Feb 9 19:01:09.170713 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T19:01:08 UTC (1707505268) Feb 9 19:01:09.170828 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 9 19:01:09.170846 kernel: intel_pstate: CPU model not supported Feb 9 19:01:09.170862 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:01:09.170880 kernel: Segment Routing with IPv6 Feb 9 19:01:09.170894 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:01:09.170909 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:01:09.170924 kernel: Key type dns_resolver registered Feb 9 19:01:09.170938 kernel: IPI shorthand broadcast: enabled Feb 9 19:01:09.170953 kernel: sched_clock: Marking stable (520449586, 352063272)->(1014049114, -141536256) Feb 9 19:01:09.170968 kernel: registered taskstats version 1 Feb 9 19:01:09.170982 kernel: Loading compiled-in X.509 certificates Feb 9 19:01:09.170997 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:01:09.171015 kernel: Key type .fscrypt registered Feb 9 19:01:09.171029 kernel: Key type fscrypt-provisioning registered Feb 9 19:01:09.171055 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:01:09.171071 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:01:09.171085 kernel: ima: No architecture policies found Feb 9 19:01:09.171100 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:01:09.171115 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:01:09.171130 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:01:09.171144 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:01:09.171162 kernel: Run /init as init process Feb 9 19:01:09.171178 kernel: with arguments: Feb 9 19:01:09.171192 kernel: /init Feb 9 19:01:09.171206 kernel: with environment: Feb 9 19:01:09.171221 kernel: HOME=/ Feb 9 19:01:09.171235 kernel: TERM=linux Feb 9 19:01:09.171249 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:01:09.171267 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:01:09.171288 systemd[1]: Detected virtualization amazon. Feb 9 19:01:09.171304 systemd[1]: Detected architecture x86-64. Feb 9 19:01:09.171319 systemd[1]: Running in initrd. Feb 9 19:01:09.171334 systemd[1]: No hostname configured, using default hostname. Feb 9 19:01:09.171364 systemd[1]: Hostname set to . Feb 9 19:01:09.171386 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:01:09.171402 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:01:09.171418 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:01:09.171434 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:01:09.171452 systemd[1]: Reached target cryptsetup.target. Feb 9 19:01:09.171468 systemd[1]: Reached target paths.target. Feb 9 19:01:09.171483 systemd[1]: Reached target slices.target. Feb 9 19:01:09.171500 systemd[1]: Reached target swap.target. Feb 9 19:01:09.171515 systemd[1]: Reached target timers.target. Feb 9 19:01:09.171535 systemd[1]: Listening on iscsid.socket. Feb 9 19:01:09.171551 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:01:09.171567 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:01:09.171582 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:01:09.171599 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:01:09.171615 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:01:09.171631 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:01:09.171650 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:01:09.171666 systemd[1]: Reached target sockets.target. Feb 9 19:01:09.171682 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:01:09.171698 systemd[1]: Finished network-cleanup.service. Feb 9 19:01:09.171713 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:01:09.171729 systemd[1]: Starting systemd-journald.service... Feb 9 19:01:09.171746 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:01:09.171763 systemd[1]: Starting systemd-resolved.service... Feb 9 19:01:09.171779 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:01:09.171803 systemd-journald[185]: Journal started Feb 9 19:01:09.171876 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2fb21c37801327bbcc55d19969a5f1) is 4.8M, max 38.7M, 33.9M free. Feb 9 19:01:09.165597 systemd-modules-load[186]: Inserted module 'overlay' Feb 9 19:01:09.404173 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:01:09.404209 kernel: Bridge firewalling registered Feb 9 19:01:09.405457 kernel: SCSI subsystem initialized Feb 9 19:01:09.405494 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:01:09.405520 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:01:09.405541 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:01:09.405557 systemd[1]: Started systemd-journald.service. Feb 9 19:01:09.405578 kernel: audit: type=1130 audit(1707505269.405:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.199921 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 9 19:01:09.243424 systemd-resolved[187]: Positive Trust Anchors: Feb 9 19:01:09.434158 kernel: audit: type=1130 audit(1707505269.412:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.434229 kernel: audit: type=1130 audit(1707505269.412:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.243438 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:01:09.243488 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:01:09.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.458076 kernel: audit: type=1130 audit(1707505269.426:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.247136 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 9 19:01:09.247918 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 9 19:01:09.406283 systemd[1]: Started systemd-resolved.service. Feb 9 19:01:09.412866 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:01:09.413246 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:01:09.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.426785 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:01:09.472729 kernel: audit: type=1130 audit(1707505269.426:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.489811 kernel: audit: type=1130 audit(1707505269.427:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.489824 kernel: audit: type=1130 audit(1707505269.459:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.427217 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:01:09.512369 kernel: audit: type=1130 audit(1707505269.472:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.427617 systemd[1]: Reached target nss-lookup.target. Feb 9 19:01:09.526171 kernel: audit: type=1130 audit(1707505269.518:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.429184 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:01:09.430712 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:01:09.432450 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:01:09.458972 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:01:09.472601 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:01:09.512446 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:01:09.519746 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:01:09.537829 dracut-cmdline[206]: dracut-dracut-053 Feb 9 19:01:09.541465 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:01:09.624058 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:01:09.638066 kernel: iscsi: registered transport (tcp) Feb 9 19:01:09.665712 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:01:09.665840 kernel: QLogic iSCSI HBA Driver Feb 9 19:01:09.705922 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:01:09.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.709184 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:01:09.780419 kernel: raid6: avx512x4 gen() 10791 MB/s Feb 9 19:01:09.798090 kernel: raid6: avx512x4 xor() 4898 MB/s Feb 9 19:01:09.816117 kernel: raid6: avx512x2 gen() 11342 MB/s Feb 9 19:01:09.834135 kernel: raid6: avx512x2 xor() 14061 MB/s Feb 9 19:01:09.852078 kernel: raid6: avx512x1 gen() 10337 MB/s Feb 9 19:01:09.870087 kernel: raid6: avx512x1 xor() 7917 MB/s Feb 9 19:01:09.888080 kernel: raid6: avx2x4 gen() 7513 MB/s Feb 9 19:01:09.906088 kernel: raid6: avx2x4 xor() 4452 MB/s Feb 9 19:01:09.928141 kernel: raid6: avx2x2 gen() 3754 MB/s Feb 9 19:01:09.946118 kernel: raid6: avx2x2 xor() 7456 MB/s Feb 9 19:01:09.965017 kernel: raid6: avx2x1 gen() 6725 MB/s Feb 9 19:01:09.982079 kernel: raid6: avx2x1 xor() 9170 MB/s Feb 9 19:01:10.001076 kernel: raid6: sse2x4 gen() 4403 MB/s Feb 9 19:01:10.019070 kernel: raid6: sse2x4 xor() 4204 MB/s Feb 9 19:01:10.037183 kernel: raid6: sse2x2 gen() 4057 MB/s Feb 9 19:01:10.055175 kernel: raid6: sse2x2 xor() 2213 MB/s Feb 9 19:01:10.073076 kernel: raid6: sse2x1 gen() 3124 MB/s Feb 9 19:01:10.091732 kernel: raid6: sse2x1 xor() 4068 MB/s Feb 9 19:01:10.091807 kernel: raid6: using algorithm avx512x2 gen() 11342 MB/s Feb 9 19:01:10.091826 kernel: raid6: .... xor() 14061 MB/s, rmw enabled Feb 9 19:01:10.092944 kernel: raid6: using avx512x2 recovery algorithm Feb 9 19:01:10.117228 kernel: xor: automatically using best checksumming function avx Feb 9 19:01:10.251106 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:01:10.263946 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:01:10.267260 systemd[1]: Starting systemd-udevd.service... Feb 9 19:01:10.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:10.266000 audit: BPF prog-id=7 op=LOAD Feb 9 19:01:10.266000 audit: BPF prog-id=8 op=LOAD Feb 9 19:01:10.284583 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 9 19:01:10.291360 systemd[1]: Started systemd-udevd.service. Feb 9 19:01:10.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:10.297553 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:01:10.322208 dracut-pre-trigger[393]: rd.md=0: removing MD RAID activation Feb 9 19:01:10.374100 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:01:10.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:10.385672 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:01:10.468712 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:01:10.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:10.540058 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:01:10.540216 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 9 19:01:10.546074 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 9 19:01:10.556051 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 9 19:01:10.568797 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:01:10.568862 kernel: GPT:9289727 != 16777215 Feb 9 19:01:10.568883 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:01:10.568904 kernel: GPT:9289727 != 16777215 Feb 9 19:01:10.568923 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:01:10.568965 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:01:10.582057 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:01:10.582140 kernel: AES CTR mode by8 optimization enabled Feb 9 19:01:10.601054 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 9 19:01:10.601333 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 9 19:01:10.602049 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Feb 9 19:01:10.611054 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:19:8d:90:0b:db Feb 9 19:01:10.612457 (udev-worker)[438]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:01:10.764468 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (433) Feb 9 19:01:10.768241 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:01:10.821934 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:01:10.830857 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:01:10.834403 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:01:10.843065 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:01:10.849749 systemd[1]: Starting disk-uuid.service... Feb 9 19:01:10.861312 disk-uuid[593]: Primary Header is updated. Feb 9 19:01:10.861312 disk-uuid[593]: Secondary Entries is updated. Feb 9 19:01:10.861312 disk-uuid[593]: Secondary Header is updated. Feb 9 19:01:10.870258 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:01:10.878060 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:01:10.884574 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:01:11.882059 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:01:11.885435 disk-uuid[594]: The operation has completed successfully. Feb 9 19:01:12.048085 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:01:12.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.048212 systemd[1]: Finished disk-uuid.service. Feb 9 19:01:12.056871 systemd[1]: Starting verity-setup.service... Feb 9 19:01:12.083146 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:01:12.178599 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:01:12.181689 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:01:12.195254 systemd[1]: Finished verity-setup.service. Feb 9 19:01:12.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.305740 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:01:12.305665 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:01:12.306986 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:01:12.308022 systemd[1]: Starting ignition-setup.service... Feb 9 19:01:12.313424 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:01:12.341906 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:01:12.341985 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 19:01:12.342008 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 19:01:12.360804 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 19:01:12.378339 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:01:12.416507 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:01:12.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.419000 audit: BPF prog-id=9 op=LOAD Feb 9 19:01:12.420645 systemd[1]: Starting systemd-networkd.service... Feb 9 19:01:12.444274 systemd[1]: Finished ignition-setup.service. Feb 9 19:01:12.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.449466 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:01:12.465415 systemd-networkd[1104]: lo: Link UP Feb 9 19:01:12.465426 systemd-networkd[1104]: lo: Gained carrier Feb 9 19:01:12.467948 systemd-networkd[1104]: Enumeration completed Feb 9 19:01:12.468372 systemd[1]: Started systemd-networkd.service. Feb 9 19:01:12.469144 systemd-networkd[1104]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:01:12.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.473406 systemd[1]: Reached target network.target. Feb 9 19:01:12.476411 systemd[1]: Starting iscsiuio.service... Feb 9 19:01:12.485889 systemd-networkd[1104]: eth0: Link UP Feb 9 19:01:12.486006 systemd-networkd[1104]: eth0: Gained carrier Feb 9 19:01:12.494455 systemd[1]: Started iscsiuio.service. Feb 9 19:01:12.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.507549 systemd[1]: Starting iscsid.service... Feb 9 19:01:12.518411 iscsid[1111]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:01:12.518411 iscsid[1111]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:01:12.518411 iscsid[1111]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:01:12.518411 iscsid[1111]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:01:12.518411 iscsid[1111]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:01:12.518411 iscsid[1111]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:01:12.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.530215 systemd-networkd[1104]: eth0: DHCPv4 address 172.31.22.121/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 19:01:12.536178 systemd[1]: Started iscsid.service. Feb 9 19:01:12.544506 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:01:12.560134 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:01:12.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.560640 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:01:12.563871 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:01:12.565197 systemd[1]: Reached target remote-fs.target. Feb 9 19:01:12.571494 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:01:12.587861 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:01:12.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.909988 ignition[1106]: Ignition 2.14.0 Feb 9 19:01:12.910003 ignition[1106]: Stage: fetch-offline Feb 9 19:01:12.910292 ignition[1106]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:01:12.910338 ignition[1106]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:01:12.946406 ignition[1106]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:01:12.947520 ignition[1106]: Ignition finished successfully Feb 9 19:01:12.952325 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:01:12.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.954101 systemd[1]: Starting ignition-fetch.service... Feb 9 19:01:12.968561 ignition[1130]: Ignition 2.14.0 Feb 9 19:01:12.968577 ignition[1130]: Stage: fetch Feb 9 19:01:12.968873 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:01:12.968911 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:01:12.986572 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:01:12.990377 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:01:13.003583 ignition[1130]: INFO : PUT result: OK Feb 9 19:01:13.007801 ignition[1130]: DEBUG : parsed url from cmdline: "" Feb 9 19:01:13.007801 ignition[1130]: INFO : no config URL provided Feb 9 19:01:13.007801 ignition[1130]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:01:13.007801 ignition[1130]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 9 19:01:13.017571 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:01:13.017571 ignition[1130]: INFO : PUT result: OK Feb 9 19:01:13.017571 ignition[1130]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 9 19:01:13.027221 ignition[1130]: INFO : GET result: OK Feb 9 19:01:13.027221 ignition[1130]: DEBUG : parsing config with SHA512: f12e557f7b123926b35537e3964a4264095133aedee9cbce30b67524e297c134a30c059c479dac28f573abd489dc26f29ab2960de4d33619067c6795abfe0c20 Feb 9 19:01:13.068465 unknown[1130]: fetched base config from "system" Feb 9 19:01:13.068479 unknown[1130]: fetched base config from "system" Feb 9 19:01:13.068488 unknown[1130]: fetched user config from "aws" Feb 9 19:01:13.074487 ignition[1130]: fetch: fetch complete Feb 9 19:01:13.074897 ignition[1130]: fetch: fetch passed Feb 9 19:01:13.074962 ignition[1130]: Ignition finished successfully Feb 9 19:01:13.081129 systemd[1]: Finished ignition-fetch.service. Feb 9 19:01:13.091141 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 9 19:01:13.091171 kernel: audit: type=1130 audit(1707505273.082:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.083955 systemd[1]: Starting ignition-kargs.service... Feb 9 19:01:13.109708 ignition[1136]: Ignition 2.14.0 Feb 9 19:01:13.109722 ignition[1136]: Stage: kargs Feb 9 19:01:13.109985 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:01:13.110139 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:01:13.124904 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:01:13.126483 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:01:13.128165 ignition[1136]: INFO : PUT result: OK Feb 9 19:01:13.132480 ignition[1136]: kargs: kargs passed Feb 9 19:01:13.132643 ignition[1136]: Ignition finished successfully Feb 9 19:01:13.134055 systemd[1]: Finished ignition-kargs.service. Feb 9 19:01:13.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.145398 kernel: audit: type=1130 audit(1707505273.136:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.138152 systemd[1]: Starting ignition-disks.service... Feb 9 19:01:13.152460 ignition[1142]: Ignition 2.14.0 Feb 9 19:01:13.152472 ignition[1142]: Stage: disks Feb 9 19:01:13.152668 ignition[1142]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:01:13.152700 ignition[1142]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:01:13.164381 ignition[1142]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:01:13.166455 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:01:13.168771 ignition[1142]: INFO : PUT result: OK Feb 9 19:01:13.172863 ignition[1142]: disks: disks passed Feb 9 19:01:13.173023 ignition[1142]: Ignition finished successfully Feb 9 19:01:13.174998 systemd[1]: Finished ignition-disks.service. Feb 9 19:01:13.184201 kernel: audit: type=1130 audit(1707505273.176:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.176784 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:01:13.186772 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:01:13.186883 systemd[1]: Reached target local-fs.target. Feb 9 19:01:13.190188 systemd[1]: Reached target sysinit.target. Feb 9 19:01:13.192097 systemd[1]: Reached target basic.target. Feb 9 19:01:13.193726 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:01:13.238123 systemd-fsck[1150]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 19:01:13.244397 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:01:13.247611 systemd[1]: Mounting sysroot.mount... Feb 9 19:01:13.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.259162 kernel: audit: type=1130 audit(1707505273.246:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.276122 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:01:13.276611 systemd[1]: Mounted sysroot.mount. Feb 9 19:01:13.276814 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:01:13.281636 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:01:13.282774 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:01:13.282839 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:01:13.282875 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:01:13.300595 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:01:13.314924 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:01:13.316219 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:01:13.326238 initrd-setup-root[1172]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:01:13.340065 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1167) Feb 9 19:01:13.344615 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:01:13.344684 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 19:01:13.344702 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 19:01:13.348084 initrd-setup-root[1196]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:01:13.357077 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 19:01:13.358234 initrd-setup-root[1206]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:01:13.363626 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:01:13.368412 initrd-setup-root[1214]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:01:13.501900 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:01:13.521062 kernel: audit: type=1130 audit(1707505273.502:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.503062 systemd[1]: Starting ignition-mount.service... Feb 9 19:01:13.525354 systemd[1]: Starting sysroot-boot.service... Feb 9 19:01:13.533801 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:01:13.535117 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:01:13.563607 ignition[1233]: INFO : Ignition 2.14.0 Feb 9 19:01:13.563607 ignition[1233]: INFO : Stage: mount Feb 9 19:01:13.566256 ignition[1233]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:01:13.566256 ignition[1233]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:01:13.587333 ignition[1233]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:01:13.587333 ignition[1233]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:01:13.587333 ignition[1233]: INFO : PUT result: OK Feb 9 19:01:13.598382 kernel: audit: type=1130 audit(1707505273.592:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.598462 ignition[1233]: INFO : mount: mount passed Feb 9 19:01:13.598462 ignition[1233]: INFO : Ignition finished successfully Feb 9 19:01:13.607090 kernel: audit: type=1130 audit(1707505273.599:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:13.589575 systemd[1]: Finished sysroot-boot.service. Feb 9 19:01:13.596137 systemd[1]: Finished ignition-mount.service. Feb 9 19:01:13.609135 systemd[1]: Starting ignition-files.service... Feb 9 19:01:13.624266 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:01:13.653100 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1242) Feb 9 19:01:13.661505 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:01:13.661577 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 19:01:13.661595 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 19:01:13.674137 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 19:01:13.679097 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:01:13.715982 ignition[1261]: INFO : Ignition 2.14.0 Feb 9 19:01:13.715982 ignition[1261]: INFO : Stage: files Feb 9 19:01:13.721696 ignition[1261]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:01:13.721696 ignition[1261]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:01:13.741461 ignition[1261]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:01:13.743150 ignition[1261]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:01:13.745388 ignition[1261]: INFO : PUT result: OK Feb 9 19:01:13.748989 ignition[1261]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:01:13.752976 ignition[1261]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:01:13.755222 ignition[1261]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:01:13.776121 ignition[1261]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:01:13.779430 ignition[1261]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:01:13.782197 unknown[1261]: wrote ssh authorized keys file for user: core Feb 9 19:01:13.783587 ignition[1261]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:01:13.785819 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:01:13.788013 ignition[1261]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 19:01:14.241223 ignition[1261]: INFO : GET result: OK Feb 9 19:01:14.279367 systemd-networkd[1104]: eth0: Gained IPv6LL Feb 9 19:01:14.578636 ignition[1261]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 19:01:14.582099 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:01:14.582099 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:01:14.582099 ignition[1261]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:01:14.990417 ignition[1261]: INFO : GET result: OK Feb 9 19:01:15.145225 ignition[1261]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 19:01:15.148809 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:01:15.148809 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 19:01:15.148809 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:01:15.161566 ignition[1261]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1795649595" Feb 9 19:01:15.169262 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1266) Feb 9 19:01:15.169287 ignition[1261]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1795649595": device or resource busy Feb 9 19:01:15.169287 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1795649595", trying btrfs: device or resource busy Feb 9 19:01:15.169287 ignition[1261]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1795649595" Feb 9 19:01:15.169287 ignition[1261]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1795649595" Feb 9 19:01:15.184770 ignition[1261]: INFO : op(3): [started] unmounting "/mnt/oem1795649595" Feb 9 19:01:15.188695 ignition[1261]: INFO : op(3): [finished] unmounting "/mnt/oem1795649595" Feb 9 19:01:15.188695 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 19:01:15.188695 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:01:15.188695 ignition[1261]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:01:15.186244 systemd[1]: mnt-oem1795649595.mount: Deactivated successfully. Feb 9 19:01:15.374899 ignition[1261]: INFO : GET result: OK Feb 9 19:01:15.669403 ignition[1261]: DEBUG : file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 9 19:01:15.672586 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:01:15.672586 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:01:15.672586 ignition[1261]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:01:15.734350 ignition[1261]: INFO : GET result: OK Feb 9 19:01:16.362104 ignition[1261]: DEBUG : file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 9 19:01:16.365890 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:01:16.365890 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:01:16.365890 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:01:16.365890 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:01:16.365890 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:01:16.365890 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:01:16.387256 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:01:16.387256 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 19:01:16.387256 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:01:16.387256 ignition[1261]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem314835159" Feb 9 19:01:16.387256 ignition[1261]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem314835159": device or resource busy Feb 9 19:01:16.387256 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem314835159", trying btrfs: device or resource busy Feb 9 19:01:16.387256 ignition[1261]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem314835159" Feb 9 19:01:16.387256 ignition[1261]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem314835159" Feb 9 19:01:16.387256 ignition[1261]: INFO : op(6): [started] unmounting "/mnt/oem314835159" Feb 9 19:01:16.387256 ignition[1261]: INFO : op(6): [finished] unmounting "/mnt/oem314835159" Feb 9 19:01:16.387256 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 19:01:16.387256 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 19:01:16.422610 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:01:16.392886 systemd[1]: mnt-oem314835159.mount: Deactivated successfully. Feb 9 19:01:16.429751 ignition[1261]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem256425771" Feb 9 19:01:16.429751 ignition[1261]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem256425771": device or resource busy Feb 9 19:01:16.429751 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem256425771", trying btrfs: device or resource busy Feb 9 19:01:16.429751 ignition[1261]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem256425771" Feb 9 19:01:16.443477 ignition[1261]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem256425771" Feb 9 19:01:16.443477 ignition[1261]: INFO : op(9): [started] unmounting "/mnt/oem256425771" Feb 9 19:01:16.448281 ignition[1261]: INFO : op(9): [finished] unmounting "/mnt/oem256425771" Feb 9 19:01:16.448281 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 19:01:16.446523 systemd[1]: mnt-oem256425771.mount: Deactivated successfully. Feb 9 19:01:16.456343 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:01:16.459501 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:01:16.471429 ignition[1261]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3766958372" Feb 9 19:01:16.473581 ignition[1261]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3766958372": device or resource busy Feb 9 19:01:16.473581 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3766958372", trying btrfs: device or resource busy Feb 9 19:01:16.473581 ignition[1261]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3766958372" Feb 9 19:01:16.473581 ignition[1261]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3766958372" Feb 9 19:01:16.473581 ignition[1261]: INFO : op(c): [started] unmounting "/mnt/oem3766958372" Feb 9 19:01:16.483267 ignition[1261]: INFO : op(c): [finished] unmounting "/mnt/oem3766958372" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(e): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(e): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(f): [started] processing unit "amazon-ssm-agent.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(f): op(10): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(f): op(10): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(f): [finished] processing unit "amazon-ssm-agent.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(11): [started] processing unit "nvidia.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(11): [finished] processing unit "nvidia.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(12): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(12): op(13): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(12): op(13): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(12): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(14): [started] processing unit "prepare-critools.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(14): op(15): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(14): op(15): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(14): [finished] processing unit "prepare-critools.service" Feb 9 19:01:16.483267 ignition[1261]: INFO : files: op(16): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:01:16.521211 ignition[1261]: INFO : files: op(16): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:01:16.521211 ignition[1261]: INFO : files: op(17): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 19:01:16.521211 ignition[1261]: INFO : files: op(17): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 19:01:16.521211 ignition[1261]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Feb 9 19:01:16.521211 ignition[1261]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Feb 9 19:01:16.521211 ignition[1261]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:01:16.521211 ignition[1261]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:01:16.521211 ignition[1261]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:01:16.521211 ignition[1261]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:01:16.554280 ignition[1261]: INFO : files: createResultFile: createFiles: op(1b): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:01:16.556702 ignition[1261]: INFO : files: createResultFile: createFiles: op(1b): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:01:16.556702 ignition[1261]: INFO : files: files passed Feb 9 19:01:16.556702 ignition[1261]: INFO : Ignition finished successfully Feb 9 19:01:16.562416 systemd[1]: Finished ignition-files.service. Feb 9 19:01:16.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.566437 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:01:16.573608 kernel: audit: type=1130 audit(1707505276.562:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.571272 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:01:16.576934 systemd[1]: Starting ignition-quench.service... Feb 9 19:01:16.582828 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:01:16.584314 systemd[1]: Finished ignition-quench.service. Feb 9 19:01:16.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.587412 initrd-setup-root-after-ignition[1286]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:01:16.599956 kernel: audit: type=1130 audit(1707505276.586:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.600005 kernel: audit: type=1131 audit(1707505276.586:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.588523 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:01:16.597015 systemd[1]: Reached target ignition-complete.target. Feb 9 19:01:16.605414 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:01:16.625483 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:01:16.625619 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:01:16.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.628230 systemd[1]: Reached target initrd-fs.target. Feb 9 19:01:16.631560 systemd[1]: Reached target initrd.target. Feb 9 19:01:16.632561 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:01:16.637076 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:01:16.650771 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:01:16.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.654048 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:01:16.667215 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:01:16.669498 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:01:16.671667 systemd[1]: Stopped target timers.target. Feb 9 19:01:16.674744 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:01:16.676250 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:01:16.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.678623 systemd[1]: Stopped target initrd.target. Feb 9 19:01:16.681145 systemd[1]: Stopped target basic.target. Feb 9 19:01:16.682915 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:01:16.685483 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:01:16.687620 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:01:16.690809 systemd[1]: Stopped target remote-fs.target. Feb 9 19:01:16.692972 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:01:16.695000 systemd[1]: Stopped target sysinit.target. Feb 9 19:01:16.697109 systemd[1]: Stopped target local-fs.target. Feb 9 19:01:16.699845 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:01:16.701203 systemd[1]: Stopped target swap.target. Feb 9 19:01:16.704833 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:01:16.707165 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:01:16.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.710016 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:01:16.712697 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:01:16.714069 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:01:16.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.716353 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:01:16.717967 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:01:16.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.720559 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:01:16.721899 systemd[1]: Stopped ignition-files.service. Feb 9 19:01:16.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.724745 systemd[1]: Stopping ignition-mount.service... Feb 9 19:01:16.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.726729 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:01:16.727659 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:01:16.750316 ignition[1299]: INFO : Ignition 2.14.0 Feb 9 19:01:16.750316 ignition[1299]: INFO : Stage: umount Feb 9 19:01:16.750316 ignition[1299]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:01:16.750316 ignition[1299]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:01:16.728077 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:01:16.729644 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:01:16.729870 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:01:16.740302 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:01:16.740392 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:01:16.769713 ignition[1299]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:01:16.771436 ignition[1299]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:01:16.773163 ignition[1299]: INFO : PUT result: OK Feb 9 19:01:16.777436 ignition[1299]: INFO : umount: umount passed Feb 9 19:01:16.779208 ignition[1299]: INFO : Ignition finished successfully Feb 9 19:01:16.779814 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:01:16.779989 systemd[1]: Stopped ignition-mount.service. Feb 9 19:01:16.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.784405 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:01:16.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.784483 systemd[1]: Stopped ignition-disks.service. Feb 9 19:01:16.785713 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:01:16.785776 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:01:16.787260 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:01:16.787318 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:01:16.788826 systemd[1]: Stopped target network.target. Feb 9 19:01:16.800336 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:01:16.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.800412 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:01:16.800758 systemd[1]: Stopped target paths.target. Feb 9 19:01:16.806895 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:01:16.811109 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:01:16.812525 systemd[1]: Stopped target slices.target. Feb 9 19:01:16.814495 systemd[1]: Stopped target sockets.target. Feb 9 19:01:16.815824 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:01:16.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.815855 systemd[1]: Closed iscsid.socket. Feb 9 19:01:16.816905 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:01:16.817001 systemd[1]: Closed iscsiuio.socket. Feb 9 19:01:16.817978 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:01:16.818129 systemd[1]: Stopped ignition-setup.service. Feb 9 19:01:16.821954 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:01:16.825364 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:01:16.827097 systemd-networkd[1104]: eth0: DHCPv6 lease lost Feb 9 19:01:16.829749 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:01:16.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.829938 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:01:16.837389 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:01:16.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.837522 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:01:16.840765 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:01:16.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.842000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:01:16.842000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:01:16.840873 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:01:16.842721 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:01:16.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.842756 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:01:16.845702 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:01:16.845752 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:01:16.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.849827 systemd[1]: Stopping network-cleanup.service... Feb 9 19:01:16.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.852400 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:01:16.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.852460 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:01:16.855067 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:01:16.855119 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:01:16.857313 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:01:16.857357 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:01:16.860701 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:01:16.890179 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:01:16.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.890462 systemd[1]: Stopped network-cleanup.service. Feb 9 19:01:16.895599 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:01:16.897105 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:01:16.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.899275 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:01:16.899335 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:01:16.901578 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:01:16.901630 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:01:16.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.903819 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:01:16.903882 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:01:16.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.906349 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:01:16.906395 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:01:16.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.911113 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:01:16.911167 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:01:16.933132 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:01:16.935807 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:01:16.935953 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:01:16.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.940133 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:01:16.940250 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:01:16.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.944185 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:01:16.944471 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:01:16.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.953410 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:01:16.953505 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:01:16.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:16.957873 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:01:16.961015 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:01:16.974592 systemd[1]: Switching root. Feb 9 19:01:17.005726 iscsid[1111]: iscsid shutting down. Feb 9 19:01:17.006959 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Feb 9 19:01:17.007021 systemd-journald[185]: Journal stopped Feb 9 19:01:22.099884 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:01:22.099961 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:01:22.099982 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:01:22.100004 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:01:22.100021 kernel: SELinux: policy capability open_perms=1 Feb 9 19:01:22.100067 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:01:22.100085 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:01:22.100103 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:01:22.100125 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:01:22.100142 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:01:22.100167 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:01:22.100188 systemd[1]: Successfully loaded SELinux policy in 70.037ms. Feb 9 19:01:22.100218 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.332ms. Feb 9 19:01:22.100238 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:01:22.100257 systemd[1]: Detected virtualization amazon. Feb 9 19:01:22.100276 systemd[1]: Detected architecture x86-64. Feb 9 19:01:22.100293 systemd[1]: Detected first boot. Feb 9 19:01:22.100312 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:01:22.100331 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:01:22.100356 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:01:22.100375 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:01:22.100394 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:01:22.100415 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:01:22.100475 kernel: kauditd_printk_skb: 54 callbacks suppressed Feb 9 19:01:22.100493 kernel: audit: type=1334 audit(1707505281.759:87): prog-id=12 op=LOAD Feb 9 19:01:22.100513 kernel: audit: type=1334 audit(1707505281.759:88): prog-id=3 op=UNLOAD Feb 9 19:01:22.100528 kernel: audit: type=1334 audit(1707505281.761:89): prog-id=13 op=LOAD Feb 9 19:01:22.109219 kernel: audit: type=1334 audit(1707505281.767:90): prog-id=14 op=LOAD Feb 9 19:01:22.109258 kernel: audit: type=1334 audit(1707505281.767:91): prog-id=4 op=UNLOAD Feb 9 19:01:22.109275 kernel: audit: type=1334 audit(1707505281.767:92): prog-id=5 op=UNLOAD Feb 9 19:01:22.109292 kernel: audit: type=1334 audit(1707505281.768:93): prog-id=15 op=LOAD Feb 9 19:01:22.109309 kernel: audit: type=1334 audit(1707505281.768:94): prog-id=12 op=UNLOAD Feb 9 19:01:22.109332 kernel: audit: type=1334 audit(1707505281.770:95): prog-id=16 op=LOAD Feb 9 19:01:22.109350 kernel: audit: type=1334 audit(1707505281.775:96): prog-id=17 op=LOAD Feb 9 19:01:22.109370 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:01:22.109393 systemd[1]: Stopped iscsiuio.service. Feb 9 19:01:22.109411 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:01:22.109429 systemd[1]: Stopped iscsid.service. Feb 9 19:01:22.109448 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:01:22.109473 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:01:22.109492 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:01:22.109603 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:01:22.109626 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:01:22.109643 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:01:22.109661 systemd[1]: Created slice system-getty.slice. Feb 9 19:01:22.109679 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:01:22.109715 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:01:22.109788 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:01:22.109809 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:01:22.109838 systemd[1]: Created slice user.slice. Feb 9 19:01:22.109856 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:01:22.109873 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:01:22.109891 systemd[1]: Set up automount boot.automount. Feb 9 19:01:22.109910 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:01:22.109929 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:01:22.109948 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:01:22.109968 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:01:22.109987 systemd[1]: Reached target integritysetup.target. Feb 9 19:01:22.110009 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:01:22.110027 systemd[1]: Reached target remote-fs.target. Feb 9 19:01:22.110067 systemd[1]: Reached target slices.target. Feb 9 19:01:22.110087 systemd[1]: Reached target swap.target. Feb 9 19:01:22.110105 systemd[1]: Reached target torcx.target. Feb 9 19:01:22.110124 systemd[1]: Reached target veritysetup.target. Feb 9 19:01:22.110143 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:01:22.110162 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:01:22.110180 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:01:22.110201 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:01:22.110219 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:01:22.110238 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:01:22.110255 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:01:22.110272 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:01:22.110290 systemd[1]: Mounting media.mount... Feb 9 19:01:22.110310 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:01:22.110330 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:01:22.110350 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:01:22.110373 systemd[1]: Mounting tmp.mount... Feb 9 19:01:22.110390 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:01:22.110408 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:01:22.110435 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:01:22.110455 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:01:22.110475 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:01:22.110492 systemd[1]: Starting modprobe@drm.service... Feb 9 19:01:22.110510 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:01:22.110529 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:01:22.110549 systemd[1]: Starting modprobe@loop.service... Feb 9 19:01:22.110571 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:01:22.117869 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:01:22.117917 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:01:22.117937 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:01:22.117964 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:01:22.117984 systemd[1]: Stopped systemd-journald.service. Feb 9 19:01:22.118003 systemd[1]: Starting systemd-journald.service... Feb 9 19:01:22.118022 kernel: loop: module loaded Feb 9 19:01:22.118055 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:01:22.118074 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:01:22.118093 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:01:22.118111 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:01:22.118130 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:01:22.118152 systemd[1]: Stopped verity-setup.service. Feb 9 19:01:22.118171 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:01:22.118190 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:01:22.118209 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:01:22.118228 systemd[1]: Mounted media.mount. Feb 9 19:01:22.118247 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:01:22.118265 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:01:22.118284 systemd[1]: Mounted tmp.mount. Feb 9 19:01:22.118400 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:01:22.118427 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:01:22.118448 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:01:22.118466 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:01:22.119712 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:01:22.119758 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:01:22.119783 systemd[1]: Finished modprobe@drm.service. Feb 9 19:01:22.119802 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:01:22.119822 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:01:22.119843 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:01:22.119865 systemd[1]: Finished modprobe@loop.service. Feb 9 19:01:22.119884 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:01:22.119996 kernel: fuse: init (API version 7.34) Feb 9 19:01:22.120023 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:01:22.120068 systemd-journald[1412]: Journal started Feb 9 19:01:22.120150 systemd-journald[1412]: Runtime Journal (/run/log/journal/ec2fb21c37801327bbcc55d19969a5f1) is 4.8M, max 38.7M, 33.9M free. Feb 9 19:01:17.479000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:01:17.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:01:17.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:01:17.607000 audit: BPF prog-id=10 op=LOAD Feb 9 19:01:17.607000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:01:17.607000 audit: BPF prog-id=11 op=LOAD Feb 9 19:01:17.607000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:01:17.789000 audit[1332]: AVC avc: denied { associate } for pid=1332 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:01:17.789000 audit[1332]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1315 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:17.789000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:01:17.793000 audit[1332]: AVC avc: denied { associate } for pid=1332 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:01:17.793000 audit[1332]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1315 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:17.793000 audit: CWD cwd="/" Feb 9 19:01:17.793000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:17.793000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:17.793000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:01:21.759000 audit: BPF prog-id=12 op=LOAD Feb 9 19:01:21.759000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:01:21.761000 audit: BPF prog-id=13 op=LOAD Feb 9 19:01:21.767000 audit: BPF prog-id=14 op=LOAD Feb 9 19:01:21.767000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:01:21.767000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:01:21.768000 audit: BPF prog-id=15 op=LOAD Feb 9 19:01:21.768000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:01:21.770000 audit: BPF prog-id=16 op=LOAD Feb 9 19:01:21.775000 audit: BPF prog-id=17 op=LOAD Feb 9 19:01:21.775000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:01:21.775000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:01:21.777000 audit: BPF prog-id=18 op=LOAD Feb 9 19:01:21.777000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:01:21.778000 audit: BPF prog-id=19 op=LOAD Feb 9 19:01:21.780000 audit: BPF prog-id=20 op=LOAD Feb 9 19:01:21.780000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:01:21.780000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:01:21.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:21.784000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:01:21.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.131690 systemd[1]: Reached target network-pre.target. Feb 9 19:01:22.131778 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:01:22.131814 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:01:21.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:21.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:21.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:21.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:21.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:21.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:21.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.003000 audit: BPF prog-id=21 op=LOAD Feb 9 19:01:22.004000 audit: BPF prog-id=22 op=LOAD Feb 9 19:01:22.004000 audit: BPF prog-id=23 op=LOAD Feb 9 19:01:22.004000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:01:22.006000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:01:22.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.096000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:01:22.096000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc55c879c0 a2=4000 a3=7ffc55c87a5c items=0 ppid=1 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:22.096000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:01:22.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:17.786223 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:01:21.751018 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:01:17.786906 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:01:21.781025 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:01:17.786935 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:01:17.786978 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:01:17.786994 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:01:17.787108 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:01:17.787130 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:01:22.137055 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:01:17.787456 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:01:17.787513 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:01:17.787533 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:01:17.788313 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:01:17.788366 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:01:17.788392 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:01:17.788415 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:01:17.788439 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:01:17.788460 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:01:21.172549 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:21Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:01:21.172806 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:21Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:01:21.173072 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:21Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:01:21.173571 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:21Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:01:21.173627 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:21Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:01:21.173753 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:01:21Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:01:22.160400 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:01:22.160487 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:01:22.160515 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:01:22.160540 systemd[1]: Started systemd-journald.service. Feb 9 19:01:22.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.160716 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:01:22.163358 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:01:22.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.167274 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:01:22.168973 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:01:22.181439 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:01:22.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.183789 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:01:22.188244 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:01:22.191183 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:01:22.194982 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:01:22.197654 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:01:22.227180 systemd-journald[1412]: Time spent on flushing to /var/log/journal/ec2fb21c37801327bbcc55d19969a5f1 is 63.927ms for 1211 entries. Feb 9 19:01:22.227180 systemd-journald[1412]: System Journal (/var/log/journal/ec2fb21c37801327bbcc55d19969a5f1) is 8.0M, max 195.6M, 187.6M free. Feb 9 19:01:22.310296 systemd-journald[1412]: Received client request to flush runtime journal. Feb 9 19:01:22.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.244648 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:01:22.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.271589 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:01:22.275567 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:01:22.312166 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:01:22.317849 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:01:22.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.321105 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:01:22.337086 udevadm[1449]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 19:01:22.338432 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:01:22.341593 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:01:22.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.387340 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:01:22.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.986898 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:01:22.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:22.989000 audit: BPF prog-id=24 op=LOAD Feb 9 19:01:22.989000 audit: BPF prog-id=25 op=LOAD Feb 9 19:01:22.989000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:01:22.989000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:01:22.990206 systemd[1]: Starting systemd-udevd.service... Feb 9 19:01:23.022277 systemd-udevd[1452]: Using default interface naming scheme 'v252'. Feb 9 19:01:23.050561 systemd[1]: Started systemd-udevd.service. Feb 9 19:01:23.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.053000 audit: BPF prog-id=26 op=LOAD Feb 9 19:01:23.054477 systemd[1]: Starting systemd-networkd.service... Feb 9 19:01:23.069000 audit: BPF prog-id=27 op=LOAD Feb 9 19:01:23.069000 audit: BPF prog-id=28 op=LOAD Feb 9 19:01:23.069000 audit: BPF prog-id=29 op=LOAD Feb 9 19:01:23.070650 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:01:23.145341 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:01:23.149853 systemd[1]: Started systemd-userdbd.service. Feb 9 19:01:23.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.170010 (udev-worker)[1460]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:01:23.254567 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:01:23.263060 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:01:23.263174 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 9 19:01:23.265057 kernel: ACPI: button: Sleep Button [SLPF] Feb 9 19:01:23.272607 systemd-networkd[1459]: lo: Link UP Feb 9 19:01:23.272620 systemd-networkd[1459]: lo: Gained carrier Feb 9 19:01:23.273618 systemd-networkd[1459]: Enumeration completed Feb 9 19:01:23.273792 systemd[1]: Started systemd-networkd.service. Feb 9 19:01:23.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.276927 systemd-networkd[1459]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:01:23.276964 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:01:23.284181 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:01:23.284537 systemd-networkd[1459]: eth0: Link UP Feb 9 19:01:23.284832 systemd-networkd[1459]: eth0: Gained carrier Feb 9 19:01:23.293323 systemd-networkd[1459]: eth0: DHCPv4 address 172.31.22.121/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 19:01:23.293000 audit[1465]: AVC avc: denied { confidentiality } for pid=1465 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:01:23.293000 audit[1465]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5584c522ed30 a1=32194 a2=7f94162d9bc5 a3=5 items=108 ppid=1452 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:23.293000 audit: CWD cwd="/" Feb 9 19:01:23.293000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=1 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=2 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=3 name=(null) inode=14542 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=4 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=5 name=(null) inode=14543 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=6 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=7 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=8 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=9 name=(null) inode=14545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=10 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=11 name=(null) inode=14546 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=12 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=13 name=(null) inode=14547 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=14 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=15 name=(null) inode=14548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=16 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=17 name=(null) inode=14549 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=18 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=19 name=(null) inode=14550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=20 name=(null) inode=14550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=21 name=(null) inode=14551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=22 name=(null) inode=14550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=23 name=(null) inode=14552 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=24 name=(null) inode=14550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=25 name=(null) inode=14553 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=26 name=(null) inode=14550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=27 name=(null) inode=14554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=28 name=(null) inode=14550 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=29 name=(null) inode=14555 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=30 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=31 name=(null) inode=14556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=32 name=(null) inode=14556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=33 name=(null) inode=14557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=34 name=(null) inode=14556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=35 name=(null) inode=14558 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=36 name=(null) inode=14556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=37 name=(null) inode=14559 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=38 name=(null) inode=14556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=39 name=(null) inode=14560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=40 name=(null) inode=14556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=41 name=(null) inode=14561 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=42 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=43 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=44 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=45 name=(null) inode=14563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=46 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=47 name=(null) inode=14564 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=48 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=49 name=(null) inode=14565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=50 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=51 name=(null) inode=14566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=52 name=(null) inode=14562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=53 name=(null) inode=14567 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=55 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=56 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=57 name=(null) inode=14569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=58 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=59 name=(null) inode=14570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=60 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=61 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=62 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=63 name=(null) inode=14572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=64 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=65 name=(null) inode=14573 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=66 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=67 name=(null) inode=14574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=68 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=69 name=(null) inode=14575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=70 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=71 name=(null) inode=14576 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=72 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=73 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=74 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=75 name=(null) inode=14578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=76 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=77 name=(null) inode=14579 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=78 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=79 name=(null) inode=14580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=80 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=81 name=(null) inode=14581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=82 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=83 name=(null) inode=14582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=84 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=85 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=86 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=87 name=(null) inode=14584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=88 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=89 name=(null) inode=14585 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=90 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=91 name=(null) inode=14586 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=92 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=93 name=(null) inode=14587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=94 name=(null) inode=14583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=95 name=(null) inode=14588 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=96 name=(null) inode=14568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=97 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=98 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=99 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=100 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=101 name=(null) inode=14591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=102 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=103 name=(null) inode=14592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=104 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=105 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=106 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PATH item=107 name=(null) inode=14594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:23.293000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:01:23.347073 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1466) Feb 9 19:01:23.355083 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Feb 9 19:01:23.372053 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Feb 9 19:01:23.386069 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:01:23.472532 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:01:23.578476 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:01:23.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.580945 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:01:23.611473 lvm[1566]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:01:23.646009 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:01:23.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.647754 systemd[1]: Reached target cryptsetup.target. Feb 9 19:01:23.651188 systemd[1]: Starting lvm2-activation.service... Feb 9 19:01:23.664680 lvm[1567]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:01:23.706591 systemd[1]: Finished lvm2-activation.service. Feb 9 19:01:23.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.708970 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:01:23.710556 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:01:23.710596 systemd[1]: Reached target local-fs.target. Feb 9 19:01:23.711831 systemd[1]: Reached target machines.target. Feb 9 19:01:23.714366 systemd[1]: Starting ldconfig.service... Feb 9 19:01:23.715968 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:01:23.716089 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:01:23.717598 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:01:23.720359 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:01:23.723982 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:01:23.725384 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:01:23.725534 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:01:23.727260 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:01:23.739954 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1569 (bootctl) Feb 9 19:01:23.742680 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:01:23.765164 systemd-tmpfiles[1572]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:01:23.770894 systemd-tmpfiles[1572]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:01:23.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.771687 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:01:23.775336 systemd-tmpfiles[1572]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:01:23.901269 systemd-fsck[1579]: fsck.fat 4.2 (2021-01-31) Feb 9 19:01:23.901269 systemd-fsck[1579]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters Feb 9 19:01:23.905460 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:01:23.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.909154 systemd[1]: Mounting boot.mount... Feb 9 19:01:23.945378 systemd[1]: Mounted boot.mount. Feb 9 19:01:23.975678 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:01:23.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:24.061114 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:01:24.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:24.074000 audit: BPF prog-id=30 op=LOAD Feb 9 19:01:24.065157 systemd[1]: Starting audit-rules.service... Feb 9 19:01:24.067122 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:01:24.071623 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:01:24.079000 audit: BPF prog-id=31 op=LOAD Feb 9 19:01:24.077278 systemd[1]: Starting systemd-resolved.service... Feb 9 19:01:24.083800 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:01:24.087414 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:01:24.100091 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:01:24.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:24.101498 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:01:24.127000 audit[1600]: SYSTEM_BOOT pid=1600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:01:24.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:24.141802 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:01:24.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:24.171487 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:01:24.213000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:01:24.213000 audit[1614]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff2fe5aa00 a2=420 a3=0 items=0 ppid=1593 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:24.213000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:01:24.214218 augenrules[1614]: No rules Feb 9 19:01:24.214917 systemd[1]: Finished audit-rules.service. Feb 9 19:01:24.238538 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:01:24.240002 systemd[1]: Reached target time-set.target. Feb 9 19:01:24.266201 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:01:24.266843 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:01:24.269544 systemd-resolved[1596]: Positive Trust Anchors: Feb 9 19:01:24.269561 systemd-resolved[1596]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:01:24.269605 systemd-resolved[1596]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:01:24.289789 systemd-timesyncd[1598]: Contacted time server 104.234.70.173:123 (0.flatcar.pool.ntp.org). Feb 9 19:01:24.290340 systemd-timesyncd[1598]: Initial clock synchronization to Fri 2024-02-09 19:01:24.247042 UTC. Feb 9 19:01:24.294957 systemd-resolved[1596]: Defaulting to hostname 'linux'. Feb 9 19:01:24.296764 systemd[1]: Started systemd-resolved.service. Feb 9 19:01:24.297998 systemd[1]: Reached target network.target. Feb 9 19:01:24.298955 systemd[1]: Reached target nss-lookup.target. Feb 9 19:01:24.317600 ldconfig[1568]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:01:24.322719 systemd[1]: Finished ldconfig.service. Feb 9 19:01:24.325134 systemd[1]: Starting systemd-update-done.service... Feb 9 19:01:24.334031 systemd[1]: Finished systemd-update-done.service. Feb 9 19:01:24.335308 systemd[1]: Reached target sysinit.target. Feb 9 19:01:24.336326 systemd[1]: Started motdgen.path. Feb 9 19:01:24.337432 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:01:24.338889 systemd[1]: Started logrotate.timer. Feb 9 19:01:24.339951 systemd[1]: Started mdadm.timer. Feb 9 19:01:24.340812 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:01:24.341799 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:01:24.341844 systemd[1]: Reached target paths.target. Feb 9 19:01:24.342770 systemd[1]: Reached target timers.target. Feb 9 19:01:24.343971 systemd[1]: Listening on dbus.socket. Feb 9 19:01:24.345927 systemd[1]: Starting docker.socket... Feb 9 19:01:24.349554 systemd[1]: Listening on sshd.socket. Feb 9 19:01:24.350604 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:01:24.351167 systemd[1]: Listening on docker.socket. Feb 9 19:01:24.352134 systemd[1]: Reached target sockets.target. Feb 9 19:01:24.353084 systemd[1]: Reached target basic.target. Feb 9 19:01:24.354059 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:01:24.354106 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:01:24.355297 systemd[1]: Starting containerd.service... Feb 9 19:01:24.357600 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:01:24.361116 systemd[1]: Starting dbus.service... Feb 9 19:01:24.363833 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:01:24.370838 systemd[1]: Starting extend-filesystems.service... Feb 9 19:01:24.371805 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:01:24.373843 systemd[1]: Starting motdgen.service... Feb 9 19:01:24.378354 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:01:24.380956 systemd[1]: Starting prepare-critools.service... Feb 9 19:01:24.383402 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:01:24.385841 systemd[1]: Starting sshd-keygen.service... Feb 9 19:01:24.391590 systemd[1]: Starting systemd-logind.service... Feb 9 19:01:24.392612 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:01:24.392685 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:01:24.438586 jq[1629]: false Feb 9 19:01:24.438811 jq[1638]: true Feb 9 19:01:24.393339 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:01:24.394379 systemd[1]: Starting update-engine.service... Feb 9 19:01:24.447432 tar[1640]: ./ Feb 9 19:01:24.447432 tar[1640]: ./loopback Feb 9 19:01:24.396770 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:01:24.425218 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:01:24.425448 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:01:24.460817 tar[1641]: crictl Feb 9 19:01:24.440335 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:01:24.440557 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:01:24.484374 jq[1648]: true Feb 9 19:01:24.496582 dbus-daemon[1628]: [system] SELinux support is enabled Feb 9 19:01:24.497109 systemd[1]: Started dbus.service. Feb 9 19:01:24.501210 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:01:24.501247 systemd[1]: Reached target system-config.target. Feb 9 19:01:24.502505 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:01:24.502536 systemd[1]: Reached target user-config.target. Feb 9 19:01:24.505163 dbus-daemon[1628]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1459 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 19:01:24.514664 dbus-daemon[1628]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:01:24.519906 systemd[1]: Starting systemd-hostnamed.service... Feb 9 19:01:24.523127 extend-filesystems[1630]: Found nvme0n1 Feb 9 19:01:24.524349 extend-filesystems[1630]: Found nvme0n1p4 Feb 9 19:01:24.524349 extend-filesystems[1630]: Found nvme0n1p6 Feb 9 19:01:24.524349 extend-filesystems[1630]: Found nvme0n1p7 Feb 9 19:01:24.524349 extend-filesystems[1630]: Found nvme0n1p9 Feb 9 19:01:24.524349 extend-filesystems[1630]: Checking size of /dev/nvme0n1p9 Feb 9 19:01:24.536750 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:01:24.536994 systemd[1]: Finished motdgen.service. Feb 9 19:01:24.562953 extend-filesystems[1630]: Resized partition /dev/nvme0n1p9 Feb 9 19:01:24.579084 extend-filesystems[1684]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:01:24.586057 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 9 19:01:24.618203 update_engine[1637]: I0209 19:01:24.617538 1637 main.cc:92] Flatcar Update Engine starting Feb 9 19:01:24.657658 update_engine[1637]: I0209 19:01:24.623689 1637 update_check_scheduler.cc:74] Next update check in 9m7s Feb 9 19:01:24.623440 systemd[1]: Started update-engine.service. Feb 9 19:01:24.626938 systemd[1]: Started locksmithd.service. Feb 9 19:01:24.666062 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 9 19:01:24.689252 bash[1685]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:01:24.690429 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:01:24.691172 extend-filesystems[1684]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 9 19:01:24.691172 extend-filesystems[1684]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 19:01:24.691172 extend-filesystems[1684]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 9 19:01:24.698882 extend-filesystems[1630]: Resized filesystem in /dev/nvme0n1p9 Feb 9 19:01:24.698882 extend-filesystems[1630]: Found nvme0n1p1 Feb 9 19:01:24.698882 extend-filesystems[1630]: Found nvme0n1p2 Feb 9 19:01:24.698882 extend-filesystems[1630]: Found nvme0n1p3 Feb 9 19:01:24.698882 extend-filesystems[1630]: Found usr Feb 9 19:01:24.692161 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:01:24.692351 systemd[1]: Finished extend-filesystems.service. Feb 9 19:01:24.696452 systemd-logind[1636]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:01:24.696485 systemd-logind[1636]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 19:01:24.696510 systemd-logind[1636]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:01:24.697213 systemd-logind[1636]: New seat seat0. Feb 9 19:01:24.701486 systemd[1]: Started systemd-logind.service. Feb 9 19:01:24.729803 env[1643]: time="2024-02-09T19:01:24.729645294Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:01:24.753014 tar[1640]: ./bandwidth Feb 9 19:01:24.861259 env[1643]: time="2024-02-09T19:01:24.861201424Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:01:24.861605 env[1643]: time="2024-02-09T19:01:24.861579511Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:01:24.865756 dbus-daemon[1628]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 19:01:24.865937 systemd[1]: Started systemd-hostnamed.service. Feb 9 19:01:24.869826 env[1643]: time="2024-02-09T19:01:24.869778862Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:01:24.871779 env[1643]: time="2024-02-09T19:01:24.871744872Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:01:24.872226 env[1643]: time="2024-02-09T19:01:24.872198156Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:01:24.874686 env[1643]: time="2024-02-09T19:01:24.874657836Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:01:24.874821 env[1643]: time="2024-02-09T19:01:24.874803096Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:01:24.874896 env[1643]: time="2024-02-09T19:01:24.874881269Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:01:24.875102 env[1643]: time="2024-02-09T19:01:24.875086353Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:01:24.875451 env[1643]: time="2024-02-09T19:01:24.875431187Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:01:24.875749 env[1643]: time="2024-02-09T19:01:24.875725772Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:01:24.875836 env[1643]: time="2024-02-09T19:01:24.875821775Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:01:24.875954 env[1643]: time="2024-02-09T19:01:24.875938528Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:01:24.876021 env[1643]: time="2024-02-09T19:01:24.876009037Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:01:24.876273 dbus-daemon[1628]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1666 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 19:01:24.879810 systemd[1]: Starting polkit.service... Feb 9 19:01:24.895956 env[1643]: time="2024-02-09T19:01:24.895903765Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:01:24.896148 env[1643]: time="2024-02-09T19:01:24.896129712Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:01:24.896240 env[1643]: time="2024-02-09T19:01:24.896225408Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:01:24.896380 env[1643]: time="2024-02-09T19:01:24.896365215Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:01:24.896628 env[1643]: time="2024-02-09T19:01:24.896610884Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:01:24.896741 env[1643]: time="2024-02-09T19:01:24.896727579Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:01:24.896824 env[1643]: time="2024-02-09T19:01:24.896809834Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:01:24.896914 env[1643]: time="2024-02-09T19:01:24.896900071Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:01:24.897000 env[1643]: time="2024-02-09T19:01:24.896986736Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:01:24.897096 env[1643]: time="2024-02-09T19:01:24.897080611Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:01:24.897209 env[1643]: time="2024-02-09T19:01:24.897195060Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:01:24.897302 env[1643]: time="2024-02-09T19:01:24.897286765Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:01:24.897563 env[1643]: time="2024-02-09T19:01:24.897544471Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:01:24.897795 env[1643]: time="2024-02-09T19:01:24.897776970Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:01:24.898485 env[1643]: time="2024-02-09T19:01:24.898451522Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:01:24.898624 env[1643]: time="2024-02-09T19:01:24.898604961Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.898713 env[1643]: time="2024-02-09T19:01:24.898697312Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:01:24.898855 env[1643]: time="2024-02-09T19:01:24.898838611Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.899007 env[1643]: time="2024-02-09T19:01:24.898990689Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.899138 env[1643]: time="2024-02-09T19:01:24.899121756Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.899218 env[1643]: time="2024-02-09T19:01:24.899204195Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.899310 env[1643]: time="2024-02-09T19:01:24.899296060Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.899384 env[1643]: time="2024-02-09T19:01:24.899370947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.899475 env[1643]: time="2024-02-09T19:01:24.899459988Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.899547 env[1643]: time="2024-02-09T19:01:24.899534316Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.899635 env[1643]: time="2024-02-09T19:01:24.899620404Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:01:24.899878 env[1643]: time="2024-02-09T19:01:24.899847745Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.899981 env[1643]: time="2024-02-09T19:01:24.899962829Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.900079 env[1643]: time="2024-02-09T19:01:24.900063370Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.900153 env[1643]: time="2024-02-09T19:01:24.900139684Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:01:24.900233 env[1643]: time="2024-02-09T19:01:24.900217081Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:01:24.900301 env[1643]: time="2024-02-09T19:01:24.900287447Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:01:24.900373 env[1643]: time="2024-02-09T19:01:24.900360398Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:01:24.900471 env[1643]: time="2024-02-09T19:01:24.900456834Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:01:24.900872 env[1643]: time="2024-02-09T19:01:24.900800697Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:01:24.911953 polkitd[1719]: Started polkitd version 121 Feb 9 19:01:24.931864 env[1643]: time="2024-02-09T19:01:24.901073041Z" level=info msg="Connect containerd service" Feb 9 19:01:24.932188 env[1643]: time="2024-02-09T19:01:24.932159351Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:01:24.935509 tar[1640]: ./ptp Feb 9 19:01:24.937721 env[1643]: time="2024-02-09T19:01:24.936974046Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:01:24.937721 env[1643]: time="2024-02-09T19:01:24.937366583Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:01:24.937721 env[1643]: time="2024-02-09T19:01:24.937422788Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:01:24.937721 env[1643]: time="2024-02-09T19:01:24.937495007Z" level=info msg="containerd successfully booted in 0.209813s" Feb 9 19:01:24.937593 systemd[1]: Started containerd.service. Feb 9 19:01:24.938491 polkitd[1719]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 19:01:24.938574 polkitd[1719]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 19:01:24.944227 polkitd[1719]: Finished loading, compiling and executing 2 rules Feb 9 19:01:24.944805 dbus-daemon[1628]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 19:01:24.945003 systemd[1]: Started polkit.service. Feb 9 19:01:24.945683 polkitd[1719]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 19:01:24.951892 env[1643]: time="2024-02-09T19:01:24.951227991Z" level=info msg="Start subscribing containerd event" Feb 9 19:01:24.951892 env[1643]: time="2024-02-09T19:01:24.951306377Z" level=info msg="Start recovering state" Feb 9 19:01:24.951892 env[1643]: time="2024-02-09T19:01:24.951395692Z" level=info msg="Start event monitor" Feb 9 19:01:24.951892 env[1643]: time="2024-02-09T19:01:24.951416346Z" level=info msg="Start snapshots syncer" Feb 9 19:01:24.951892 env[1643]: time="2024-02-09T19:01:24.951430294Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:01:24.951892 env[1643]: time="2024-02-09T19:01:24.951439920Z" level=info msg="Start streaming server" Feb 9 19:01:24.967528 systemd-hostnamed[1666]: Hostname set to (transient) Feb 9 19:01:24.970051 systemd-resolved[1596]: System hostname changed to 'ip-172-31-22-121'. Feb 9 19:01:25.139655 tar[1640]: ./vlan Feb 9 19:01:25.159224 systemd-networkd[1459]: eth0: Gained IPv6LL Feb 9 19:01:25.161889 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:01:25.163714 systemd[1]: Reached target network-online.target. Feb 9 19:01:25.167388 systemd[1]: Started amazon-ssm-agent.service. Feb 9 19:01:25.170731 systemd[1]: Started nvidia.service. Feb 9 19:01:25.295593 coreos-metadata[1627]: Feb 09 19:01:25.295 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 9 19:01:25.310438 coreos-metadata[1627]: Feb 09 19:01:25.301 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 9 19:01:25.310438 coreos-metadata[1627]: Feb 09 19:01:25.305 INFO Fetch successful Feb 9 19:01:25.310438 coreos-metadata[1627]: Feb 09 19:01:25.305 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 9 19:01:25.321245 coreos-metadata[1627]: Feb 09 19:01:25.320 INFO Fetch successful Feb 9 19:01:25.342201 unknown[1627]: wrote ssh authorized keys file for user: core Feb 9 19:01:25.387763 update-ssh-keys[1797]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:01:25.388771 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:01:25.391574 amazon-ssm-agent[1776]: 2024/02/09 19:01:25 Failed to load instance info from vault. RegistrationKey does not exist. Feb 9 19:01:25.433895 amazon-ssm-agent[1776]: Initializing new seelog logger Feb 9 19:01:25.436301 amazon-ssm-agent[1776]: New Seelog Logger Creation Complete Feb 9 19:01:25.436542 amazon-ssm-agent[1776]: 2024/02/09 19:01:25 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 19:01:25.436613 amazon-ssm-agent[1776]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 19:01:25.436902 amazon-ssm-agent[1776]: 2024/02/09 19:01:25 processing appconfig overrides Feb 9 19:01:25.447853 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 19:01:25.528201 tar[1640]: ./host-device Feb 9 19:01:25.715981 tar[1640]: ./tuning Feb 9 19:01:25.841184 tar[1640]: ./vrf Feb 9 19:01:25.903458 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Create new startup processor Feb 9 19:01:25.912660 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [LongRunningPluginsManager] registered plugins: {} Feb 9 19:01:25.912660 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Initializing bookkeeping folders Feb 9 19:01:25.913322 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO removing the completed state files Feb 9 19:01:25.913322 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Initializing bookkeeping folders for long running plugins Feb 9 19:01:25.913322 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 9 19:01:25.913322 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Initializing healthcheck folders for long running plugins Feb 9 19:01:25.913322 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Initializing locations for inventory plugin Feb 9 19:01:25.913322 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Initializing default location for custom inventory Feb 9 19:01:25.913322 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Initializing default location for file inventory Feb 9 19:01:25.913322 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Initializing default location for role inventory Feb 9 19:01:25.913322 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Init the cloudwatchlogs publisher Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Successfully loaded platform independent plugin aws:runDockerAction Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Successfully loaded platform independent plugin aws:refreshAssociation Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Successfully loaded platform independent plugin aws:configurePackage Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Successfully loaded platform independent plugin aws:downloadContent Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Successfully loaded platform independent plugin aws:runDocument Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Successfully loaded platform independent plugin aws:softwareInventory Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Successfully loaded platform independent plugin aws:configureDocker Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Successfully loaded platform dependent plugin aws:runShellScript Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 9 19:01:25.914093 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO OS: linux, Arch: amd64 Feb 9 19:01:25.931712 amazon-ssm-agent[1776]: datastore file /var/lib/amazon/ssm/i-0f0d389264b021f18/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 9 19:01:25.964355 tar[1640]: ./sbr Feb 9 19:01:26.004199 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessagingDeliveryService] Starting document processing engine... Feb 9 19:01:26.016875 systemd[1]: Finished prepare-critools.service. Feb 9 19:01:26.083232 tar[1640]: ./tap Feb 9 19:01:26.099076 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 9 19:01:26.144919 tar[1640]: ./dhcp Feb 9 19:01:26.193310 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 9 19:01:26.287836 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessagingDeliveryService] Starting message polling Feb 9 19:01:26.292953 tar[1640]: ./static Feb 9 19:01:26.332939 tar[1640]: ./firewall Feb 9 19:01:26.382481 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 9 19:01:26.398764 tar[1640]: ./macvlan Feb 9 19:01:26.457345 tar[1640]: ./dummy Feb 9 19:01:26.477358 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [instanceID=i-0f0d389264b021f18] Starting association polling Feb 9 19:01:26.512756 tar[1640]: ./bridge Feb 9 19:01:26.572468 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 9 19:01:26.578722 tar[1640]: ./ipvlan Feb 9 19:01:26.634795 tar[1640]: ./portmap Feb 9 19:01:26.667699 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 9 19:01:26.690512 tar[1640]: ./host-local Feb 9 19:01:26.756411 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:01:26.763636 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 9 19:01:26.797628 locksmithd[1692]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:01:26.859190 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 9 19:01:26.955197 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 9 19:01:27.051177 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 19:01:27.082925 sshd_keygen[1656]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:01:27.144049 systemd[1]: Finished sshd-keygen.service. Feb 9 19:01:27.147479 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessageGatewayService] Starting session document processing engine... Feb 9 19:01:27.149267 systemd[1]: Starting issuegen.service... Feb 9 19:01:27.159832 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:01:27.160154 systemd[1]: Finished issuegen.service. Feb 9 19:01:27.167957 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:01:27.180155 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:01:27.184131 systemd[1]: Started getty@tty1.service. Feb 9 19:01:27.190120 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:01:27.192300 systemd[1]: Reached target getty.target. Feb 9 19:01:27.193396 systemd[1]: Reached target multi-user.target. Feb 9 19:01:27.196774 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:01:27.235915 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:01:27.236581 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:01:27.241607 systemd[1]: Startup finished in 855ms (kernel) + 8.553s (initrd) + 9.840s (userspace) = 19.248s. Feb 9 19:01:27.250777 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 9 19:01:27.347521 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 9 19:01:27.444596 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0f0d389264b021f18, requestId: 985f2f76-d694-4d32-a64d-822d9fcd9c40 Feb 9 19:01:27.541596 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [OfflineService] Starting document processing engine... Feb 9 19:01:27.638871 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [OfflineService] [EngineProcessor] Starting Feb 9 19:01:27.736374 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [OfflineService] [EngineProcessor] Initial processing Feb 9 19:01:27.833988 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [OfflineService] Starting message polling Feb 9 19:01:27.931827 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [OfflineService] Starting send replies to MDS Feb 9 19:01:28.029939 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 9 19:01:28.128127 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 9 19:01:28.226537 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [MessageGatewayService] listening reply. Feb 9 19:01:28.325243 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 9 19:01:28.424025 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [StartupProcessor] Executing startup processor tasks Feb 9 19:01:28.523068 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 9 19:01:28.622376 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 9 19:01:28.721764 amazon-ssm-agent[1776]: 2024-02-09 19:01:25 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 9 19:01:28.821368 amazon-ssm-agent[1776]: 2024-02-09 19:01:26 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0f0d389264b021f18?role=subscribe&stream=input Feb 9 19:01:28.921233 amazon-ssm-agent[1776]: 2024-02-09 19:01:26 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0f0d389264b021f18?role=subscribe&stream=input Feb 9 19:01:29.021187 amazon-ssm-agent[1776]: 2024-02-09 19:01:26 INFO [MessageGatewayService] Starting receiving message from control channel Feb 9 19:01:29.121452 amazon-ssm-agent[1776]: 2024-02-09 19:01:26 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 9 19:01:30.138710 amazon-ssm-agent[1776]: 2024-02-09 19:01:30 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 9 19:01:33.797235 systemd[1]: Created slice system-sshd.slice. Feb 9 19:01:33.800470 systemd[1]: Started sshd@0-172.31.22.121:22-139.178.68.195:37804.service. Feb 9 19:01:33.923578 amazon-ssm-agent[1776]: 2024-02-09 19:01:33 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 19:01:34.006139 sshd[1839]: Accepted publickey for core from 139.178.68.195 port 37804 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 19:01:34.008400 sshd[1839]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:34.022668 systemd[1]: Created slice user-500.slice. Feb 9 19:01:34.028906 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:01:34.034836 systemd-logind[1636]: New session 1 of user core. Feb 9 19:01:34.046733 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:01:34.049700 systemd[1]: Starting user@500.service... Feb 9 19:01:34.058145 (systemd)[1843]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:34.232641 systemd[1843]: Queued start job for default target default.target. Feb 9 19:01:34.237049 systemd[1843]: Reached target paths.target. Feb 9 19:01:34.237085 systemd[1843]: Reached target sockets.target. Feb 9 19:01:34.237102 systemd[1843]: Reached target timers.target. Feb 9 19:01:34.237118 systemd[1843]: Reached target basic.target. Feb 9 19:01:34.237328 systemd[1]: Started user@500.service. Feb 9 19:01:34.239268 systemd[1]: Started session-1.scope. Feb 9 19:01:34.243610 systemd[1843]: Reached target default.target. Feb 9 19:01:34.244537 systemd[1843]: Startup finished in 171ms. Feb 9 19:01:34.422212 systemd[1]: Started sshd@1-172.31.22.121:22-139.178.68.195:37806.service. Feb 9 19:01:34.582689 sshd[1852]: Accepted publickey for core from 139.178.68.195 port 37806 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 19:01:34.584627 sshd[1852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:34.591103 systemd-logind[1636]: New session 2 of user core. Feb 9 19:01:34.592602 systemd[1]: Started session-2.scope. Feb 9 19:01:34.735955 sshd[1852]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:34.744811 systemd[1]: sshd@1-172.31.22.121:22-139.178.68.195:37806.service: Deactivated successfully. Feb 9 19:01:34.747614 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:01:34.749579 systemd-logind[1636]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:01:34.750771 systemd-logind[1636]: Removed session 2. Feb 9 19:01:34.762657 systemd[1]: Started sshd@2-172.31.22.121:22-139.178.68.195:37816.service. Feb 9 19:01:34.939157 sshd[1858]: Accepted publickey for core from 139.178.68.195 port 37816 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 19:01:34.941264 sshd[1858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:34.946098 systemd-logind[1636]: New session 3 of user core. Feb 9 19:01:34.946777 systemd[1]: Started session-3.scope. Feb 9 19:01:35.071084 sshd[1858]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:35.075288 systemd[1]: sshd@2-172.31.22.121:22-139.178.68.195:37816.service: Deactivated successfully. Feb 9 19:01:35.076836 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:01:35.078001 systemd-logind[1636]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:01:35.079566 systemd-logind[1636]: Removed session 3. Feb 9 19:01:35.102492 systemd[1]: Started sshd@3-172.31.22.121:22-139.178.68.195:37828.service. Feb 9 19:01:35.285363 sshd[1864]: Accepted publickey for core from 139.178.68.195 port 37828 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 19:01:35.290376 sshd[1864]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:35.313990 systemd-logind[1636]: New session 4 of user core. Feb 9 19:01:35.316630 systemd[1]: Started session-4.scope. Feb 9 19:01:35.447365 sshd[1864]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:35.451783 systemd[1]: sshd@3-172.31.22.121:22-139.178.68.195:37828.service: Deactivated successfully. Feb 9 19:01:35.452943 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:01:35.453796 systemd-logind[1636]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:01:35.454915 systemd-logind[1636]: Removed session 4. Feb 9 19:01:35.472793 systemd[1]: Started sshd@4-172.31.22.121:22-139.178.68.195:37832.service. Feb 9 19:01:35.636345 sshd[1870]: Accepted publickey for core from 139.178.68.195 port 37832 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 19:01:35.638664 sshd[1870]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:35.645110 systemd[1]: Started session-5.scope. Feb 9 19:01:35.645748 systemd-logind[1636]: New session 5 of user core. Feb 9 19:01:35.768123 sudo[1873]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:01:35.769680 sudo[1873]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:01:35.779290 dbus-daemon[1628]: нN\x9a\u0012V: received setenforce notice (enforcing=1071936896) Feb 9 19:01:35.782269 sudo[1873]: pam_unix(sudo:session): session closed for user root Feb 9 19:01:35.805558 sshd[1870]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:35.810166 systemd[1]: sshd@4-172.31.22.121:22-139.178.68.195:37832.service: Deactivated successfully. Feb 9 19:01:35.811122 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:01:35.811804 systemd-logind[1636]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:01:35.813072 systemd-logind[1636]: Removed session 5. Feb 9 19:01:35.836758 systemd[1]: Started sshd@5-172.31.22.121:22-139.178.68.195:37844.service. Feb 9 19:01:36.008058 sshd[1877]: Accepted publickey for core from 139.178.68.195 port 37844 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 19:01:36.010104 sshd[1877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:36.026526 systemd-logind[1636]: New session 6 of user core. Feb 9 19:01:36.029581 systemd[1]: Started session-6.scope. Feb 9 19:01:36.153220 sudo[1881]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:01:36.153537 sudo[1881]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:01:36.164864 sudo[1881]: pam_unix(sudo:session): session closed for user root Feb 9 19:01:36.178342 sudo[1880]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:01:36.178563 sudo[1880]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:01:36.223180 systemd[1]: Stopping audit-rules.service... Feb 9 19:01:36.223000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:01:36.225692 auditctl[1884]: No rules Feb 9 19:01:36.230559 kernel: kauditd_printk_skb: 191 callbacks suppressed Feb 9 19:01:36.230668 kernel: audit: type=1305 audit(1707505296.223:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:01:36.226325 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:01:36.226529 systemd[1]: Stopped audit-rules.service. Feb 9 19:01:36.230086 systemd[1]: Starting audit-rules.service... Feb 9 19:01:36.223000 audit[1884]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3c8b5dc0 a2=420 a3=0 items=0 ppid=1 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:36.239168 kernel: audit: type=1300 audit(1707505296.223:173): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3c8b5dc0 a2=420 a3=0 items=0 ppid=1 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:36.223000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:01:36.242255 kernel: audit: type=1327 audit(1707505296.223:173): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:01:36.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.249538 kernel: audit: type=1131 audit(1707505296.225:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.262238 augenrules[1901]: No rules Feb 9 19:01:36.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.262000 audit[1880]: USER_END pid=1880 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.262967 systemd[1]: Finished audit-rules.service. Feb 9 19:01:36.264547 sudo[1880]: pam_unix(sudo:session): session closed for user root Feb 9 19:01:36.274920 kernel: audit: type=1130 audit(1707505296.262:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.275127 kernel: audit: type=1106 audit(1707505296.262:176): pid=1880 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.275205 kernel: audit: type=1104 audit(1707505296.262:177): pid=1880 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.262000 audit[1880]: CRED_DISP pid=1880 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.286703 sshd[1877]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:36.287000 audit[1877]: USER_END pid=1877 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 19:01:36.291342 systemd-logind[1636]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:01:36.287000 audit[1877]: CRED_DISP pid=1877 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 19:01:36.293512 systemd[1]: sshd@5-172.31.22.121:22-139.178.68.195:37844.service: Deactivated successfully. Feb 9 19:01:36.294367 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:01:36.296265 systemd-logind[1636]: Removed session 6. Feb 9 19:01:36.302738 kernel: audit: type=1106 audit(1707505296.287:178): pid=1877 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 19:01:36.302864 kernel: audit: type=1104 audit(1707505296.287:179): pid=1877 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 19:01:36.302906 kernel: audit: type=1131 audit(1707505296.288:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.121:22-139.178.68.195:37844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.121:22-139.178.68.195:37844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.121:22-139.178.68.195:59170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.314274 systemd[1]: Started sshd@6-172.31.22.121:22-139.178.68.195:59170.service. Feb 9 19:01:36.480000 audit[1907]: USER_ACCT pid=1907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 19:01:36.481913 sshd[1907]: Accepted publickey for core from 139.178.68.195 port 59170 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 19:01:36.482000 audit[1907]: CRED_ACQ pid=1907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 19:01:36.483000 audit[1907]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd43024f90 a2=3 a3=0 items=0 ppid=1 pid=1907 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:36.483000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:36.485455 sshd[1907]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:36.499529 systemd-logind[1636]: New session 7 of user core. Feb 9 19:01:36.500215 systemd[1]: Started session-7.scope. Feb 9 19:01:36.511000 audit[1907]: USER_START pid=1907 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 19:01:36.513000 audit[1909]: CRED_ACQ pid=1909 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 19:01:36.607000 audit[1910]: USER_ACCT pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.608817 sudo[1910]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:01:36.607000 audit[1910]: CRED_REFR pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:01:36.609140 sudo[1910]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:01:36.611000 audit[1910]: USER_START pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:01:37.240157 systemd[1]: Reloading. Feb 9 19:01:37.336999 /usr/lib/systemd/system-generators/torcx-generator[1939]: time="2024-02-09T19:01:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:01:37.345200 /usr/lib/systemd/system-generators/torcx-generator[1939]: time="2024-02-09T19:01:37Z" level=info msg="torcx already run" Feb 9 19:01:37.488101 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:01:37.488123 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:01:37.511537 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:01:37.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.599000 audit: BPF prog-id=40 op=LOAD Feb 9 19:01:37.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.600000 audit: BPF prog-id=41 op=LOAD Feb 9 19:01:37.600000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:01:37.600000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit: BPF prog-id=42 op=LOAD Feb 9 19:01:37.603000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit: BPF prog-id=43 op=LOAD Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.603000 audit: BPF prog-id=44 op=LOAD Feb 9 19:01:37.603000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:01:37.603000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:01:37.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.606000 audit: BPF prog-id=45 op=LOAD Feb 9 19:01:37.606000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit: BPF prog-id=46 op=LOAD Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.607000 audit: BPF prog-id=47 op=LOAD Feb 9 19:01:37.607000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:01:37.607000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:01:37.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit: BPF prog-id=48 op=LOAD Feb 9 19:01:37.610000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit: BPF prog-id=49 op=LOAD Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.610000 audit: BPF prog-id=50 op=LOAD Feb 9 19:01:37.610000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:01:37.610000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:01:37.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.611000 audit: BPF prog-id=51 op=LOAD Feb 9 19:01:37.611000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.612000 audit: BPF prog-id=52 op=LOAD Feb 9 19:01:37.612000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:01:37.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit: BPF prog-id=53 op=LOAD Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.613000 audit: BPF prog-id=54 op=LOAD Feb 9 19:01:37.613000 audit: BPF prog-id=36 op=UNLOAD Feb 9 19:01:37.613000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:01:37.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit: BPF prog-id=55 op=LOAD Feb 9 19:01:37.615000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.615000 audit: BPF prog-id=56 op=LOAD Feb 9 19:01:37.615000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:01:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:37.617000 audit: BPF prog-id=57 op=LOAD Feb 9 19:01:37.617000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:01:37.631915 systemd[1]: Started kubelet.service. Feb 9 19:01:37.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:37.652439 systemd[1]: Starting coreos-metadata.service... Feb 9 19:01:37.743295 kubelet[1991]: E0209 19:01:37.743234 1991 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 19:01:37.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:01:37.746753 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:01:37.746947 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:01:37.790125 coreos-metadata[2003]: Feb 09 19:01:37.789 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 9 19:01:37.792291 coreos-metadata[2003]: Feb 09 19:01:37.792 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Feb 9 19:01:37.797410 coreos-metadata[2003]: Feb 09 19:01:37.797 INFO Fetch successful Feb 9 19:01:37.797815 coreos-metadata[2003]: Feb 09 19:01:37.797 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Feb 9 19:01:37.800908 coreos-metadata[2003]: Feb 09 19:01:37.800 INFO Fetch successful Feb 9 19:01:37.800908 coreos-metadata[2003]: Feb 09 19:01:37.800 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Feb 9 19:01:37.804407 coreos-metadata[2003]: Feb 09 19:01:37.804 INFO Fetch successful Feb 9 19:01:37.804782 coreos-metadata[2003]: Feb 09 19:01:37.804 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Feb 9 19:01:37.806917 coreos-metadata[2003]: Feb 09 19:01:37.806 INFO Fetch successful Feb 9 19:01:37.806917 coreos-metadata[2003]: Feb 09 19:01:37.806 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Feb 9 19:01:37.808002 coreos-metadata[2003]: Feb 09 19:01:37.807 INFO Fetch successful Feb 9 19:01:37.808002 coreos-metadata[2003]: Feb 09 19:01:37.807 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Feb 9 19:01:37.808630 coreos-metadata[2003]: Feb 09 19:01:37.808 INFO Fetch successful Feb 9 19:01:37.808707 coreos-metadata[2003]: Feb 09 19:01:37.808 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Feb 9 19:01:37.809220 coreos-metadata[2003]: Feb 09 19:01:37.809 INFO Fetch successful Feb 9 19:01:37.809448 coreos-metadata[2003]: Feb 09 19:01:37.809 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Feb 9 19:01:37.810015 coreos-metadata[2003]: Feb 09 19:01:37.809 INFO Fetch successful Feb 9 19:01:37.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:37.819412 systemd[1]: Finished coreos-metadata.service. Feb 9 19:01:38.257674 systemd[1]: Stopped kubelet.service. Feb 9 19:01:38.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:38.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:38.280751 systemd[1]: Reloading. Feb 9 19:01:38.398084 /usr/lib/systemd/system-generators/torcx-generator[2060]: time="2024-02-09T19:01:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:01:38.398122 /usr/lib/systemd/system-generators/torcx-generator[2060]: time="2024-02-09T19:01:38Z" level=info msg="torcx already run" Feb 9 19:01:38.525656 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:01:38.525681 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:01:38.559705 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:01:38.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.654000 audit: BPF prog-id=58 op=LOAD Feb 9 19:01:38.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.655000 audit: BPF prog-id=59 op=LOAD Feb 9 19:01:38.656000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:01:38.656000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:01:38.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit: BPF prog-id=60 op=LOAD Feb 9 19:01:38.658000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit: BPF prog-id=61 op=LOAD Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.658000 audit: BPF prog-id=62 op=LOAD Feb 9 19:01:38.658000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:01:38.658000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:01:38.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit: BPF prog-id=63 op=LOAD Feb 9 19:01:38.663000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit: BPF prog-id=64 op=LOAD Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.663000 audit: BPF prog-id=65 op=LOAD Feb 9 19:01:38.663000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:01:38.663000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:01:38.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit: BPF prog-id=66 op=LOAD Feb 9 19:01:38.666000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit: BPF prog-id=67 op=LOAD Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.666000 audit: BPF prog-id=68 op=LOAD Feb 9 19:01:38.666000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:01:38.666000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:01:38.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.669000 audit: BPF prog-id=69 op=LOAD Feb 9 19:01:38.669000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit: BPF prog-id=70 op=LOAD Feb 9 19:01:38.670000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit: BPF prog-id=71 op=LOAD Feb 9 19:01:38.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.671000 audit: BPF prog-id=72 op=LOAD Feb 9 19:01:38.671000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:01:38.671000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:01:38.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit: BPF prog-id=73 op=LOAD Feb 9 19:01:38.673000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.673000 audit: BPF prog-id=74 op=LOAD Feb 9 19:01:38.673000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:01:38.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:38.675000 audit: BPF prog-id=75 op=LOAD Feb 9 19:01:38.675000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:01:38.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:38.695757 systemd[1]: Started kubelet.service. Feb 9 19:01:38.772411 kubelet[2113]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:01:38.772797 kubelet[2113]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:01:38.772797 kubelet[2113]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:01:38.772797 kubelet[2113]: I0209 19:01:38.772510 2113 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:01:39.034142 kubelet[2113]: I0209 19:01:39.034097 2113 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 19:01:39.034142 kubelet[2113]: I0209 19:01:39.034127 2113 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:01:39.034986 kubelet[2113]: I0209 19:01:39.034961 2113 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 19:01:39.044454 kubelet[2113]: I0209 19:01:39.044419 2113 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:01:39.049375 kubelet[2113]: I0209 19:01:39.049348 2113 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:01:39.049619 kubelet[2113]: I0209 19:01:39.049606 2113 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:01:39.049829 kubelet[2113]: I0209 19:01:39.049812 2113 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 19:01:39.050103 kubelet[2113]: I0209 19:01:39.049845 2113 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 19:01:39.050103 kubelet[2113]: I0209 19:01:39.049858 2113 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 19:01:39.050103 kubelet[2113]: I0209 19:01:39.049985 2113 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:01:39.050245 kubelet[2113]: I0209 19:01:39.050166 2113 kubelet.go:393] "Attempting to sync node with API server" Feb 9 19:01:39.050245 kubelet[2113]: I0209 19:01:39.050187 2113 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:01:39.050245 kubelet[2113]: I0209 19:01:39.050218 2113 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:01:39.050245 kubelet[2113]: I0209 19:01:39.050240 2113 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:01:39.051130 kubelet[2113]: E0209 19:01:39.051109 2113 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:39.051264 kubelet[2113]: E0209 19:01:39.051168 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:39.051898 kubelet[2113]: I0209 19:01:39.051882 2113 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:01:39.052429 kubelet[2113]: W0209 19:01:39.052410 2113 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:01:39.052981 kubelet[2113]: I0209 19:01:39.052961 2113 server.go:1232] "Started kubelet" Feb 9 19:01:39.053318 kubelet[2113]: I0209 19:01:39.053297 2113 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:01:39.054618 kubelet[2113]: I0209 19:01:39.054602 2113 server.go:462] "Adding debug handlers to kubelet server" Feb 9 19:01:39.054000 audit[2113]: AVC avc: denied { mac_admin } for pid=2113 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:39.054000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:01:39.054000 audit[2113]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000942780 a1=c0001db9b0 a2=c000942750 a3=25 items=0 ppid=1 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.054000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:01:39.054000 audit[2113]: AVC avc: denied { mac_admin } for pid=2113 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:39.054000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:01:39.054000 audit[2113]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0001d1fe0 a1=c0001db9c8 a2=c000942810 a3=25 items=0 ppid=1 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.054000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:01:39.055907 kubelet[2113]: I0209 19:01:39.055505 2113 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:01:39.055907 kubelet[2113]: I0209 19:01:39.055550 2113 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:01:39.055907 kubelet[2113]: I0209 19:01:39.055625 2113 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:01:39.056566 kubelet[2113]: I0209 19:01:39.053335 2113 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:01:39.056749 kubelet[2113]: I0209 19:01:39.056729 2113 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 19:01:39.057153 kubelet[2113]: E0209 19:01:39.057131 2113 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:01:39.057228 kubelet[2113]: E0209 19:01:39.057159 2113 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:01:39.063798 kubelet[2113]: E0209 19:01:39.062562 2113 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.22.121\" not found" Feb 9 19:01:39.063798 kubelet[2113]: I0209 19:01:39.062595 2113 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 19:01:39.063798 kubelet[2113]: I0209 19:01:39.062779 2113 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:01:39.063798 kubelet[2113]: I0209 19:01:39.062843 2113 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 19:01:39.082993 kubelet[2113]: E0209 19:01:39.082960 2113 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.121\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 9 19:01:39.083288 kubelet[2113]: E0209 19:01:39.083020 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d225bab0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 52935856, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 52935856, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.083540 kubelet[2113]: W0209 19:01:39.083518 2113 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.22.121" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:01:39.083625 kubelet[2113]: E0209 19:01:39.083553 2113 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.22.121" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:01:39.083625 kubelet[2113]: W0209 19:01:39.083620 2113 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:01:39.083721 kubelet[2113]: E0209 19:01:39.083637 2113 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:01:39.083721 kubelet[2113]: W0209 19:01:39.083703 2113 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:01:39.083721 kubelet[2113]: E0209 19:01:39.083718 2113 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:01:39.090930 kubelet[2113]: E0209 19:01:39.090844 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d265fcff", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 57147135, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 57147135, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.097371 kubelet[2113]: I0209 19:01:39.097340 2113 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:01:39.097539 kubelet[2113]: I0209 19:01:39.097529 2113 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:01:39.097966 kubelet[2113]: I0209 19:01:39.097953 2113 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:01:39.098416 kubelet[2113]: E0209 19:01:39.097839 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb6077", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.121 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96297591, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96297591, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.099705 kubelet[2113]: E0209 19:01:39.099642 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb711c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.121 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96301852, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96301852, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.101123 kubelet[2113]: E0209 19:01:39.101026 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb7ceb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.121 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96304875, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96304875, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.101359 kubelet[2113]: I0209 19:01:39.101337 2113 policy_none.go:49] "None policy: Start" Feb 9 19:01:39.102757 kubelet[2113]: I0209 19:01:39.102743 2113 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:01:39.102883 kubelet[2113]: I0209 19:01:39.102873 2113 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:01:39.115348 systemd[1]: Created slice kubepods.slice. Feb 9 19:01:39.124715 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:01:39.127000 audit[2126]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:39.127000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff5b836a50 a2=0 a3=7fff5b836a3c items=0 ppid=2113 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:01:39.137070 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:01:39.138000 audit[2131]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:39.138000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff915830a0 a2=0 a3=7fff9158308c items=0 ppid=2113 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:01:39.145147 kubelet[2113]: I0209 19:01:39.145116 2113 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:01:39.144000 audit[2113]: AVC avc: denied { mac_admin } for pid=2113 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:39.144000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:01:39.144000 audit[2113]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f28120 a1=c000f60570 a2=c000f280f0 a3=25 items=0 ppid=1 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.144000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:01:39.145522 kubelet[2113]: I0209 19:01:39.145192 2113 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:01:39.145522 kubelet[2113]: I0209 19:01:39.145399 2113 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:01:39.148684 kubelet[2113]: E0209 19:01:39.148434 2113 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.22.121\" not found" Feb 9 19:01:39.148803 kubelet[2113]: E0209 19:01:39.148618 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d7c6fa85", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 147389573, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 147389573, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.143000 audit[2133]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:39.143000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe8f166150 a2=0 a3=7ffe8f16613c items=0 ppid=2113 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:01:39.160000 audit[2138]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:39.160000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd8f38790 a2=0 a3=7ffdd8f3877c items=0 ppid=2113 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.160000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:01:39.164067 kubelet[2113]: I0209 19:01:39.164016 2113 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.121" Feb 9 19:01:39.168538 kubelet[2113]: E0209 19:01:39.168368 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb6077", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.121 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96297591, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 163927064, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events "172.31.22.121.17b24705d4bb6077" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.168840 kubelet[2113]: E0209 19:01:39.168812 2113 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.22.121" Feb 9 19:01:39.171452 kubelet[2113]: E0209 19:01:39.171383 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb711c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.121 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96301852, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 163934245, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events "172.31.22.121.17b24705d4bb711c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.172573 kubelet[2113]: E0209 19:01:39.172496 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb7ceb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.121 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96304875, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 163976401, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events "172.31.22.121.17b24705d4bb7ceb" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.214000 audit[2143]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:39.214000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd77ab5a10 a2=0 a3=7ffd77ab59fc items=0 ppid=2113 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:01:39.216507 kubelet[2113]: I0209 19:01:39.216467 2113 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 19:01:39.216000 audit[2144]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:39.216000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe119313c0 a2=0 a3=7ffe119313ac items=0 ppid=2113 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.216000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:01:39.218205 kubelet[2113]: I0209 19:01:39.218190 2113 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 19:01:39.218265 kubelet[2113]: I0209 19:01:39.218216 2113 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 19:01:39.218265 kubelet[2113]: I0209 19:01:39.218243 2113 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 19:01:39.218337 kubelet[2113]: E0209 19:01:39.218299 2113 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:01:39.217000 audit[2145]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:39.217000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbeffe270 a2=0 a3=7ffdbeffe25c items=0 ppid=2113 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:01:39.219904 kubelet[2113]: W0209 19:01:39.219858 2113 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:01:39.219904 kubelet[2113]: E0209 19:01:39.219889 2113 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:01:39.219000 audit[2146]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:39.219000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd74c1c2b0 a2=0 a3=7ffd74c1c29c items=0 ppid=2113 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:01:39.221000 audit[2148]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:39.221000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdd1e54580 a2=0 a3=7ffdd1e5456c items=0 ppid=2113 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:01:39.221000 audit[2147]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:39.221000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff6cb69d80 a2=0 a3=10e3 items=0 ppid=2113 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:01:39.222000 audit[2149]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:39.222000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe9c04ffa0 a2=0 a3=7ffe9c04ff8c items=0 ppid=2113 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:01:39.224000 audit[2150]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:39.224000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce9a97af0 a2=0 a3=7ffce9a97adc items=0 ppid=2113 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:39.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:01:39.285683 kubelet[2113]: E0209 19:01:39.285560 2113 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.121\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 9 19:01:39.369634 kubelet[2113]: I0209 19:01:39.369600 2113 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.121" Feb 9 19:01:39.371137 kubelet[2113]: E0209 19:01:39.371107 2113 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.22.121" Feb 9 19:01:39.371564 kubelet[2113]: E0209 19:01:39.371489 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb6077", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.121 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96297591, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 369547124, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events "172.31.22.121.17b24705d4bb6077" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.372699 kubelet[2113]: E0209 19:01:39.372630 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb711c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.121 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96301852, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 369559725, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events "172.31.22.121.17b24705d4bb711c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.373896 kubelet[2113]: E0209 19:01:39.373831 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb7ceb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.121 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96304875, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 369563738, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events "172.31.22.121.17b24705d4bb7ceb" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.687265 kubelet[2113]: E0209 19:01:39.687225 2113 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.121\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 9 19:01:39.772593 kubelet[2113]: I0209 19:01:39.772559 2113 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.121" Feb 9 19:01:39.774157 kubelet[2113]: E0209 19:01:39.774133 2113 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.22.121" Feb 9 19:01:39.774293 kubelet[2113]: E0209 19:01:39.774119 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb6077", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.121 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96297591, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 772489218, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events "172.31.22.121.17b24705d4bb6077" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.775346 kubelet[2113]: E0209 19:01:39.775226 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb711c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.121 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96301852, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 772503018, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events "172.31.22.121.17b24705d4bb711c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:39.776867 kubelet[2113]: E0209 19:01:39.776771 2113 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121.17b24705d4bb7ceb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.121", UID:"172.31.22.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.121 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.121"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 96304875, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 1, 39, 772510149, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.121"}': 'events "172.31.22.121.17b24705d4bb7ceb" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:01:40.005796 kubelet[2113]: W0209 19:01:40.005677 2113 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:01:40.005796 kubelet[2113]: E0209 19:01:40.005717 2113 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:01:40.042894 kubelet[2113]: I0209 19:01:40.042747 2113 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 19:01:40.051322 kubelet[2113]: E0209 19:01:40.051246 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:40.451459 kubelet[2113]: E0209 19:01:40.451424 2113 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.22.121" not found Feb 9 19:01:40.497459 kubelet[2113]: E0209 19:01:40.497417 2113 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.22.121\" not found" node="172.31.22.121" Feb 9 19:01:40.576235 kubelet[2113]: I0209 19:01:40.576179 2113 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.121" Feb 9 19:01:40.583601 kubelet[2113]: I0209 19:01:40.583570 2113 kubelet_node_status.go:73] "Successfully registered node" node="172.31.22.121" Feb 9 19:01:40.597506 kubelet[2113]: E0209 19:01:40.597477 2113 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.22.121\" not found" Feb 9 19:01:40.699136 kubelet[2113]: I0209 19:01:40.699096 2113 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 19:01:40.699961 env[1643]: time="2024-02-09T19:01:40.699910508Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:01:40.700394 kubelet[2113]: I0209 19:01:40.700210 2113 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 19:01:40.715000 audit[1910]: USER_END pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:01:40.715000 audit[1910]: CRED_DISP pid=1910 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:01:40.716583 sudo[1910]: pam_unix(sudo:session): session closed for user root Feb 9 19:01:40.739376 sshd[1907]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:40.742000 audit[1907]: USER_END pid=1907 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 19:01:40.742000 audit[1907]: CRED_DISP pid=1907 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 19:01:40.745678 systemd[1]: sshd@6-172.31.22.121:22-139.178.68.195:59170.service: Deactivated successfully. Feb 9 19:01:40.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.121:22-139.178.68.195:59170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:40.747153 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:01:40.748412 systemd-logind[1636]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:01:40.749726 systemd-logind[1636]: Removed session 7. Feb 9 19:01:41.051783 kubelet[2113]: I0209 19:01:41.051660 2113 apiserver.go:52] "Watching apiserver" Feb 9 19:01:41.052426 kubelet[2113]: E0209 19:01:41.051666 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:41.055259 kubelet[2113]: I0209 19:01:41.055231 2113 topology_manager.go:215] "Topology Admit Handler" podUID="bcda9d49-c3b9-4076-bd5b-bd9baea5b98e" podNamespace="calico-system" podName="csi-node-driver-9kflt" Feb 9 19:01:41.055405 kubelet[2113]: I0209 19:01:41.055329 2113 topology_manager.go:215] "Topology Admit Handler" podUID="7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce" podNamespace="kube-system" podName="kube-proxy-vq8z6" Feb 9 19:01:41.055405 kubelet[2113]: I0209 19:01:41.055404 2113 topology_manager.go:215] "Topology Admit Handler" podUID="131d37e1-0edf-4c7a-8c76-1838d822a38d" podNamespace="calico-system" podName="calico-node-lgdzt" Feb 9 19:01:41.055753 kubelet[2113]: E0209 19:01:41.055731 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9kflt" podUID="bcda9d49-c3b9-4076-bd5b-bd9baea5b98e" Feb 9 19:01:41.063558 kubelet[2113]: I0209 19:01:41.063527 2113 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:01:41.067684 systemd[1]: Created slice kubepods-besteffort-pod131d37e1_0edf_4c7a_8c76_1838d822a38d.slice. Feb 9 19:01:41.073334 kubelet[2113]: I0209 19:01:41.073296 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/131d37e1-0edf-4c7a-8c76-1838d822a38d-var-run-calico\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.073524 kubelet[2113]: I0209 19:01:41.073370 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/131d37e1-0edf-4c7a-8c76-1838d822a38d-cni-net-dir\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.073524 kubelet[2113]: I0209 19:01:41.073408 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n6nmr\" (UniqueName: \"kubernetes.io/projected/bcda9d49-c3b9-4076-bd5b-bd9baea5b98e-kube-api-access-n6nmr\") pod \"csi-node-driver-9kflt\" (UID: \"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e\") " pod="calico-system/csi-node-driver-9kflt" Feb 9 19:01:41.073524 kubelet[2113]: I0209 19:01:41.073436 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce-kube-proxy\") pod \"kube-proxy-vq8z6\" (UID: \"7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce\") " pod="kube-system/kube-proxy-vq8z6" Feb 9 19:01:41.073524 kubelet[2113]: I0209 19:01:41.073463 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/131d37e1-0edf-4c7a-8c76-1838d822a38d-lib-modules\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.073524 kubelet[2113]: I0209 19:01:41.073489 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/131d37e1-0edf-4c7a-8c76-1838d822a38d-tigera-ca-bundle\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.073766 kubelet[2113]: I0209 19:01:41.073518 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pwkqp\" (UniqueName: \"kubernetes.io/projected/131d37e1-0edf-4c7a-8c76-1838d822a38d-kube-api-access-pwkqp\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.073766 kubelet[2113]: I0209 19:01:41.073546 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/bcda9d49-c3b9-4076-bd5b-bd9baea5b98e-varrun\") pod \"csi-node-driver-9kflt\" (UID: \"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e\") " pod="calico-system/csi-node-driver-9kflt" Feb 9 19:01:41.073766 kubelet[2113]: I0209 19:01:41.073574 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/bcda9d49-c3b9-4076-bd5b-bd9baea5b98e-socket-dir\") pod \"csi-node-driver-9kflt\" (UID: \"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e\") " pod="calico-system/csi-node-driver-9kflt" Feb 9 19:01:41.073766 kubelet[2113]: I0209 19:01:41.073605 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce-lib-modules\") pod \"kube-proxy-vq8z6\" (UID: \"7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce\") " pod="kube-system/kube-proxy-vq8z6" Feb 9 19:01:41.073766 kubelet[2113]: I0209 19:01:41.073637 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-756q4\" (UniqueName: \"kubernetes.io/projected/7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce-kube-api-access-756q4\") pod \"kube-proxy-vq8z6\" (UID: \"7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce\") " pod="kube-system/kube-proxy-vq8z6" Feb 9 19:01:41.074091 kubelet[2113]: I0209 19:01:41.073669 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/131d37e1-0edf-4c7a-8c76-1838d822a38d-xtables-lock\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.074091 kubelet[2113]: I0209 19:01:41.073710 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/131d37e1-0edf-4c7a-8c76-1838d822a38d-cni-bin-dir\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.074091 kubelet[2113]: I0209 19:01:41.073744 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/131d37e1-0edf-4c7a-8c76-1838d822a38d-flexvol-driver-host\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.074091 kubelet[2113]: I0209 19:01:41.073777 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/bcda9d49-c3b9-4076-bd5b-bd9baea5b98e-kubelet-dir\") pod \"csi-node-driver-9kflt\" (UID: \"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e\") " pod="calico-system/csi-node-driver-9kflt" Feb 9 19:01:41.074091 kubelet[2113]: I0209 19:01:41.073825 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/bcda9d49-c3b9-4076-bd5b-bd9baea5b98e-registration-dir\") pod \"csi-node-driver-9kflt\" (UID: \"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e\") " pod="calico-system/csi-node-driver-9kflt" Feb 9 19:01:41.074650 kubelet[2113]: I0209 19:01:41.073856 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/131d37e1-0edf-4c7a-8c76-1838d822a38d-node-certs\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.074650 kubelet[2113]: I0209 19:01:41.073971 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/131d37e1-0edf-4c7a-8c76-1838d822a38d-cni-log-dir\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.074650 kubelet[2113]: I0209 19:01:41.074004 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce-xtables-lock\") pod \"kube-proxy-vq8z6\" (UID: \"7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce\") " pod="kube-system/kube-proxy-vq8z6" Feb 9 19:01:41.074650 kubelet[2113]: I0209 19:01:41.074052 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/131d37e1-0edf-4c7a-8c76-1838d822a38d-policysync\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.074650 kubelet[2113]: I0209 19:01:41.074085 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/131d37e1-0edf-4c7a-8c76-1838d822a38d-var-lib-calico\") pod \"calico-node-lgdzt\" (UID: \"131d37e1-0edf-4c7a-8c76-1838d822a38d\") " pod="calico-system/calico-node-lgdzt" Feb 9 19:01:41.085987 systemd[1]: Created slice kubepods-besteffort-pod7e9e1e8a_f6b0_4e49_84c2_e0b04cf50fce.slice. Feb 9 19:01:41.178305 kubelet[2113]: E0209 19:01:41.178237 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:01:41.178591 kubelet[2113]: W0209 19:01:41.178569 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:01:41.178870 kubelet[2113]: E0209 19:01:41.178849 2113 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:01:41.179632 kubelet[2113]: E0209 19:01:41.179566 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:01:41.179793 kubelet[2113]: W0209 19:01:41.179778 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:01:41.180169 kubelet[2113]: E0209 19:01:41.180156 2113 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:01:41.180525 kubelet[2113]: E0209 19:01:41.180511 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:01:41.180707 kubelet[2113]: W0209 19:01:41.180689 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:01:41.180807 kubelet[2113]: E0209 19:01:41.180797 2113 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:01:41.181106 kubelet[2113]: E0209 19:01:41.181095 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:01:41.181201 kubelet[2113]: W0209 19:01:41.181189 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:01:41.181340 kubelet[2113]: E0209 19:01:41.181330 2113 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:01:41.181645 kubelet[2113]: E0209 19:01:41.181633 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:01:41.181839 kubelet[2113]: W0209 19:01:41.181825 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:01:41.181928 kubelet[2113]: E0209 19:01:41.181919 2113 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:01:41.189516 kubelet[2113]: E0209 19:01:41.189490 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:01:41.189516 kubelet[2113]: W0209 19:01:41.189517 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:01:41.189796 kubelet[2113]: E0209 19:01:41.189541 2113 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:01:41.210541 kubelet[2113]: E0209 19:01:41.209355 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:01:41.210541 kubelet[2113]: W0209 19:01:41.209372 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:01:41.210541 kubelet[2113]: E0209 19:01:41.209396 2113 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:01:41.229294 kubelet[2113]: E0209 19:01:41.229260 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:01:41.229294 kubelet[2113]: W0209 19:01:41.229285 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:01:41.229484 kubelet[2113]: E0209 19:01:41.229310 2113 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:01:41.230880 kubelet[2113]: E0209 19:01:41.230856 2113 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:01:41.231090 kubelet[2113]: W0209 19:01:41.230876 2113 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:01:41.231090 kubelet[2113]: E0209 19:01:41.231015 2113 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:01:41.385328 env[1643]: time="2024-02-09T19:01:41.385269554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lgdzt,Uid:131d37e1-0edf-4c7a-8c76-1838d822a38d,Namespace:calico-system,Attempt:0,}" Feb 9 19:01:41.395406 env[1643]: time="2024-02-09T19:01:41.395147147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vq8z6,Uid:7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce,Namespace:kube-system,Attempt:0,}" Feb 9 19:01:41.961187 env[1643]: time="2024-02-09T19:01:41.961132632Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:41.964164 env[1643]: time="2024-02-09T19:01:41.964120816Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:41.966270 env[1643]: time="2024-02-09T19:01:41.966228714Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:41.969598 env[1643]: time="2024-02-09T19:01:41.969267276Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:41.971835 env[1643]: time="2024-02-09T19:01:41.971789785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:41.980327 env[1643]: time="2024-02-09T19:01:41.980271668Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:41.989521 env[1643]: time="2024-02-09T19:01:41.989470507Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:41.992761 env[1643]: time="2024-02-09T19:01:41.992683412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:42.024895 env[1643]: time="2024-02-09T19:01:42.024815998Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:01:42.024895 env[1643]: time="2024-02-09T19:01:42.024859961Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:01:42.025200 env[1643]: time="2024-02-09T19:01:42.024877223Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:01:42.025200 env[1643]: time="2024-02-09T19:01:42.025027379Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d403c68f47474e12325ab6a95faad06086f1b68c7123731acffd5ddba2479edf pid=2180 runtime=io.containerd.runc.v2 Feb 9 19:01:42.025500 env[1643]: time="2024-02-09T19:01:42.025287100Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:01:42.025500 env[1643]: time="2024-02-09T19:01:42.025322412Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:01:42.025500 env[1643]: time="2024-02-09T19:01:42.025338670Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:01:42.026170 env[1643]: time="2024-02-09T19:01:42.025913563Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/691473b3a1e5ff6786e5f51d1016d4ebe97eb15773f0642df9465bae3f5a7455 pid=2181 runtime=io.containerd.runc.v2 Feb 9 19:01:42.053467 kubelet[2113]: E0209 19:01:42.053390 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:42.056921 systemd[1]: Started cri-containerd-d403c68f47474e12325ab6a95faad06086f1b68c7123731acffd5ddba2479edf.scope. Feb 9 19:01:42.065918 systemd[1]: Started cri-containerd-691473b3a1e5ff6786e5f51d1016d4ebe97eb15773f0642df9465bae3f5a7455.scope. Feb 9 19:01:42.091168 kernel: kauditd_printk_skb: 482 callbacks suppressed Feb 9 19:01:42.091304 kernel: audit: type=1400 audit(1707505302.085:628): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100750 kernel: audit: type=1400 audit(1707505302.085:629): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.113993 kernel: audit: type=1400 audit(1707505302.085:630): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.114271 kernel: audit: type=1400 audit(1707505302.085:631): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.127474 kernel: audit: type=1400 audit(1707505302.085:632): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.127627 kernel: audit: type=1400 audit(1707505302.085:633): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.132799 kernel: audit: type=1400 audit(1707505302.085:634): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.143296 kernel: audit: type=1400 audit(1707505302.085:635): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.143479 kernel: audit: type=1400 audit(1707505302.085:636): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.143513 kernel: audit: type=1400 audit(1707505302.087:637): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.087000 audit: BPF prog-id=76 op=LOAD Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2180 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:42.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303363363866343734373465313233323561623661393566616164 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2180 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:42.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303363363866343734373465313233323561623661393566616164 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.090000 audit: BPF prog-id=77 op=LOAD Feb 9 19:01:42.090000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015fac0 items=0 ppid=2180 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:42.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303363363866343734373465313233323561623661393566616164 Feb 9 19:01:42.093000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.093000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.093000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.093000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.093000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.093000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.093000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.093000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.093000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.093000 audit: BPF prog-id=78 op=LOAD Feb 9 19:01:42.093000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015fb08 items=0 ppid=2180 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:42.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303363363866343734373465313233323561623661393566616164 Feb 9 19:01:42.099000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:01:42.100000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:01:42.100000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.100000 audit: BPF prog-id=79 op=LOAD Feb 9 19:01:42.100000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015ff18 items=0 ppid=2180 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:42.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303363363866343734373465313233323561623661393566616164 Feb 9 19:01:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.137000 audit: BPF prog-id=80 op=LOAD Feb 9 19:01:42.137000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.137000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2181 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:42.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313437336233613165356666363738366535663531643130313664 Feb 9 19:01:42.149000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.149000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2181 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:42.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313437336233613165356666363738366535663531643130313664 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit: BPF prog-id=81 op=LOAD Feb 9 19:01:42.150000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d53f0 items=0 ppid=2181 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:42.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313437336233613165356666363738366535663531643130313664 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit: BPF prog-id=82 op=LOAD Feb 9 19:01:42.150000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d5438 items=0 ppid=2181 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:42.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313437336233613165356666363738366535663531643130313664 Feb 9 19:01:42.150000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:01:42.150000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:42.150000 audit: BPF prog-id=83 op=LOAD Feb 9 19:01:42.150000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d5848 items=0 ppid=2181 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:42.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639313437336233613165356666363738366535663531643130313664 Feb 9 19:01:42.157562 env[1643]: time="2024-02-09T19:01:42.157511540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lgdzt,Uid:131d37e1-0edf-4c7a-8c76-1838d822a38d,Namespace:calico-system,Attempt:0,} returns sandbox id \"d403c68f47474e12325ab6a95faad06086f1b68c7123731acffd5ddba2479edf\"" Feb 9 19:01:42.162986 env[1643]: time="2024-02-09T19:01:42.162917438Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:01:42.177813 env[1643]: time="2024-02-09T19:01:42.177764732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vq8z6,Uid:7e9e1e8a-f6b0-4e49-84c2-e0b04cf50fce,Namespace:kube-system,Attempt:0,} returns sandbox id \"691473b3a1e5ff6786e5f51d1016d4ebe97eb15773f0642df9465bae3f5a7455\"" Feb 9 19:01:42.194187 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4088574741.mount: Deactivated successfully. Feb 9 19:01:43.054480 kubelet[2113]: E0209 19:01:43.054434 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:43.219063 kubelet[2113]: E0209 19:01:43.218792 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9kflt" podUID="bcda9d49-c3b9-4076-bd5b-bd9baea5b98e" Feb 9 19:01:43.444992 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3452004638.mount: Deactivated successfully. Feb 9 19:01:44.055157 kubelet[2113]: E0209 19:01:44.055116 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:44.463787 env[1643]: time="2024-02-09T19:01:44.463730612Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:44.467526 env[1643]: time="2024-02-09T19:01:44.467477844Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:44.470619 env[1643]: time="2024-02-09T19:01:44.470560775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:44.474128 env[1643]: time="2024-02-09T19:01:44.474078913Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:44.475118 env[1643]: time="2024-02-09T19:01:44.475081451Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:01:44.478415 env[1643]: time="2024-02-09T19:01:44.478157409Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 19:01:44.480805 env[1643]: time="2024-02-09T19:01:44.480768356Z" level=info msg="CreateContainer within sandbox \"d403c68f47474e12325ab6a95faad06086f1b68c7123731acffd5ddba2479edf\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:01:44.498261 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3044764281.mount: Deactivated successfully. Feb 9 19:01:44.506306 env[1643]: time="2024-02-09T19:01:44.506254254Z" level=info msg="CreateContainer within sandbox \"d403c68f47474e12325ab6a95faad06086f1b68c7123731acffd5ddba2479edf\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"19c494fb1191123c4f6d1d093ddf98f62f1c1be92d26e88e9c4fc39ac9b8d9df\"" Feb 9 19:01:44.507901 env[1643]: time="2024-02-09T19:01:44.507858768Z" level=info msg="StartContainer for \"19c494fb1191123c4f6d1d093ddf98f62f1c1be92d26e88e9c4fc39ac9b8d9df\"" Feb 9 19:01:44.535626 systemd[1]: Started cri-containerd-19c494fb1191123c4f6d1d093ddf98f62f1c1be92d26e88e9c4fc39ac9b8d9df.scope. Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2180 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:44.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139633439346662313139313132336334663664316430393364646639 Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.559000 audit: BPF prog-id=84 op=LOAD Feb 9 19:01:44.559000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000306a80 items=0 ppid=2180 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:44.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139633439346662313139313132336334663664316430393364646639 Feb 9 19:01:44.560000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.560000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.560000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.560000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.560000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.560000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.560000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.560000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.560000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.560000 audit: BPF prog-id=85 op=LOAD Feb 9 19:01:44.560000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000306ac8 items=0 ppid=2180 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:44.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139633439346662313139313132336334663664316430393364646639 Feb 9 19:01:44.561000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:01:44.561000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:01:44.561000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.561000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.561000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.561000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.561000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.561000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.561000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.561000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.561000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.561000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:44.561000 audit: BPF prog-id=86 op=LOAD Feb 9 19:01:44.561000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000306b58 items=0 ppid=2180 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:44.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139633439346662313139313132336334663664316430393364646639 Feb 9 19:01:44.597627 env[1643]: time="2024-02-09T19:01:44.597520162Z" level=info msg="StartContainer for \"19c494fb1191123c4f6d1d093ddf98f62f1c1be92d26e88e9c4fc39ac9b8d9df\" returns successfully" Feb 9 19:01:44.614781 systemd[1]: cri-containerd-19c494fb1191123c4f6d1d093ddf98f62f1c1be92d26e88e9c4fc39ac9b8d9df.scope: Deactivated successfully. Feb 9 19:01:44.616000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:01:44.647977 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-19c494fb1191123c4f6d1d093ddf98f62f1c1be92d26e88e9c4fc39ac9b8d9df-rootfs.mount: Deactivated successfully. Feb 9 19:01:44.757689 env[1643]: time="2024-02-09T19:01:44.757269610Z" level=info msg="shim disconnected" id=19c494fb1191123c4f6d1d093ddf98f62f1c1be92d26e88e9c4fc39ac9b8d9df Feb 9 19:01:44.757689 env[1643]: time="2024-02-09T19:01:44.757626842Z" level=warning msg="cleaning up after shim disconnected" id=19c494fb1191123c4f6d1d093ddf98f62f1c1be92d26e88e9c4fc39ac9b8d9df namespace=k8s.io Feb 9 19:01:44.757689 env[1643]: time="2024-02-09T19:01:44.757650569Z" level=info msg="cleaning up dead shim" Feb 9 19:01:44.783917 env[1643]: time="2024-02-09T19:01:44.783773360Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:01:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2297 runtime=io.containerd.runc.v2\n" Feb 9 19:01:45.057298 kubelet[2113]: E0209 19:01:45.055386 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:45.220601 kubelet[2113]: E0209 19:01:45.220568 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9kflt" podUID="bcda9d49-c3b9-4076-bd5b-bd9baea5b98e" Feb 9 19:01:45.766930 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount193219336.mount: Deactivated successfully. Feb 9 19:01:46.055811 kubelet[2113]: E0209 19:01:46.055661 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:46.645697 env[1643]: time="2024-02-09T19:01:46.645642092Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:46.648156 env[1643]: time="2024-02-09T19:01:46.648108903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:46.650134 env[1643]: time="2024-02-09T19:01:46.650098487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:46.652123 env[1643]: time="2024-02-09T19:01:46.652085325Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:46.653101 env[1643]: time="2024-02-09T19:01:46.652674377Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 9 19:01:46.654228 env[1643]: time="2024-02-09T19:01:46.654199922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:01:46.655573 env[1643]: time="2024-02-09T19:01:46.655501047Z" level=info msg="CreateContainer within sandbox \"691473b3a1e5ff6786e5f51d1016d4ebe97eb15773f0642df9465bae3f5a7455\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:01:46.672430 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2565339937.mount: Deactivated successfully. Feb 9 19:01:46.684254 env[1643]: time="2024-02-09T19:01:46.684177285Z" level=info msg="CreateContainer within sandbox \"691473b3a1e5ff6786e5f51d1016d4ebe97eb15773f0642df9465bae3f5a7455\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"488550bb5f26a107ce8adbf513e0a688b8d5d7b2dfa4b2638d5db90fb9959c1c\"" Feb 9 19:01:46.685618 env[1643]: time="2024-02-09T19:01:46.685543129Z" level=info msg="StartContainer for \"488550bb5f26a107ce8adbf513e0a688b8d5d7b2dfa4b2638d5db90fb9959c1c\"" Feb 9 19:01:46.735607 systemd[1]: Started cri-containerd-488550bb5f26a107ce8adbf513e0a688b8d5d7b2dfa4b2638d5db90fb9959c1c.scope. Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2181 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438383535306262356632366131303763653861646266353133653061 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit: BPF prog-id=87 op=LOAD Feb 9 19:01:46.772000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002bbee0 items=0 ppid=2181 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438383535306262356632366131303763653861646266353133653061 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit: BPF prog-id=88 op=LOAD Feb 9 19:01:46.772000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002bbf28 items=0 ppid=2181 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438383535306262356632366131303763653861646266353133653061 Feb 9 19:01:46.772000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:01:46.772000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:46.772000 audit: BPF prog-id=89 op=LOAD Feb 9 19:01:46.772000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002bbfb8 items=0 ppid=2181 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438383535306262356632366131303763653861646266353133653061 Feb 9 19:01:46.803480 env[1643]: time="2024-02-09T19:01:46.803428272Z" level=info msg="StartContainer for \"488550bb5f26a107ce8adbf513e0a688b8d5d7b2dfa4b2638d5db90fb9959c1c\" returns successfully" Feb 9 19:01:46.878000 audit[2370]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:46.878000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7bca7920 a2=0 a3=7fff7bca790c items=0 ppid=2331 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:01:46.881000 audit[2371]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:46.881000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc79138850 a2=0 a3=7ffc7913883c items=0 ppid=2331 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:01:46.883000 audit[2372]: NETFILTER_CFG table=mangle:16 family=2 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:46.883000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc86fa54c0 a2=0 a3=7ffc86fa54ac items=0 ppid=2331 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:01:46.883000 audit[2373]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:46.883000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5f8dcc70 a2=0 a3=7ffc5f8dcc5c items=0 ppid=2331 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:01:46.885000 audit[2374]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:46.885000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffb8802a0 a2=0 a3=7ffffb88028c items=0 ppid=2331 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.885000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:01:46.887000 audit[2375]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:46.887000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd05ff9040 a2=0 a3=7ffd05ff902c items=0 ppid=2331 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:01:46.987000 audit[2376]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:46.987000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd58712660 a2=0 a3=7ffd5871264c items=0 ppid=2331 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:01:46.995000 audit[2378]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:46.995000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffcc19e510 a2=0 a3=7fffcc19e4fc items=0 ppid=2331 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:01:47.013000 audit[2381]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.013000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb7f564d0 a2=0 a3=7ffeb7f564bc items=0 ppid=2331 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:01:47.019000 audit[2382]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.019000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa536ca10 a2=0 a3=7fffa536c9fc items=0 ppid=2331 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:01:47.035000 audit[2384]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.035000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffbdddc820 a2=0 a3=7fffbdddc80c items=0 ppid=2331 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:01:47.045000 audit[2385]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.045000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe74f50090 a2=0 a3=7ffe74f5007c items=0 ppid=2331 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:01:47.054000 audit[2387]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.054000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd83270ef0 a2=0 a3=7ffd83270edc items=0 ppid=2331 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:01:47.056313 kubelet[2113]: E0209 19:01:47.056241 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:47.070000 audit[2390]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.070000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe4643a390 a2=0 a3=7ffe4643a37c items=0 ppid=2331 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:01:47.072000 audit[2391]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.072000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe29925e0 a2=0 a3=7fffe29925cc items=0 ppid=2331 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:01:47.076000 audit[2393]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.076000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd334d350 a2=0 a3=7fffd334d33c items=0 ppid=2331 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:01:47.077000 audit[2394]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.077000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbf00a1b0 a2=0 a3=7ffcbf00a19c items=0 ppid=2331 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:01:47.081000 audit[2396]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.081000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd62286a0 a2=0 a3=7ffcd622868c items=0 ppid=2331 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:01:47.087000 audit[2399]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.089880 kernel: kauditd_printk_skb: 245 callbacks suppressed Feb 9 19:01:47.089941 kernel: audit: type=1325 audit(1707505307.087:695): table=filter:32 family=2 entries=1 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.087000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd681f2c30 a2=0 a3=7ffd681f2c1c items=0 ppid=2331 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.101850 kernel: audit: type=1300 audit(1707505307.087:695): arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd681f2c30 a2=0 a3=7ffd681f2c1c items=0 ppid=2331 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:01:47.108784 kernel: audit: type=1327 audit(1707505307.087:695): proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:01:47.108917 kernel: audit: type=1325 audit(1707505307.095:696): table=filter:33 family=2 entries=1 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.095000 audit[2402]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.095000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe25ca5780 a2=0 a3=7ffe25ca576c items=0 ppid=2331 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.120937 kernel: audit: type=1300 audit(1707505307.095:696): arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe25ca5780 a2=0 a3=7ffe25ca576c items=0 ppid=2331 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:01:47.131862 kernel: audit: type=1327 audit(1707505307.095:696): proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:01:47.132350 kernel: audit: type=1325 audit(1707505307.097:697): table=nat:34 family=2 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.097000 audit[2403]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.097000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc1dcd3d40 a2=0 a3=7ffc1dcd3d2c items=0 ppid=2331 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.142173 kernel: audit: type=1300 audit(1707505307.097:697): arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc1dcd3d40 a2=0 a3=7ffc1dcd3d2c items=0 ppid=2331 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:01:47.146070 kernel: audit: type=1327 audit(1707505307.097:697): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:01:47.101000 audit[2405]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.101000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcb9d480c0 a2=0 a3=7ffcb9d480ac items=0 ppid=2331 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:01:47.163203 kernel: audit: type=1325 audit(1707505307.101:698): table=nat:35 family=2 entries=2 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.168000 audit[2410]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.168000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe00e8f840 a2=0 a3=7ffe00e8f82c items=0 ppid=2331 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:01:47.170000 audit[2411]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.170000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc5a2eca0 a2=0 a3=7ffcc5a2ec8c items=0 ppid=2331 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:01:47.174000 audit[2413]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:01:47.174000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff7e716dd0 a2=0 a3=7fff7e716dbc items=0 ppid=2331 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:01:47.197000 audit[2419]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:47.197000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc6f454330 a2=0 a3=7ffc6f45431c items=0 ppid=2331 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:47.221513 kubelet[2113]: E0209 19:01:47.219326 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9kflt" podUID="bcda9d49-c3b9-4076-bd5b-bd9baea5b98e" Feb 9 19:01:47.235000 audit[2419]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:47.235000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc6f454330 a2=0 a3=7ffc6f45431c items=0 ppid=2331 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.235000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:47.254000 audit[2427]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.254000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff663f2fb0 a2=0 a3=7fff663f2f9c items=0 ppid=2331 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:01:47.265000 audit[2429]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.265000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd5880a130 a2=0 a3=7ffd5880a11c items=0 ppid=2331 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:01:47.272000 audit[2432]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.272000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff64f86240 a2=0 a3=7fff64f8622c items=0 ppid=2331 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:01:47.274000 audit[2433]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2433 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.274000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2c45ec60 a2=0 a3=7ffc2c45ec4c items=0 ppid=2331 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:01:47.279000 audit[2435]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.279000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcca0efc90 a2=0 a3=7ffcca0efc7c items=0 ppid=2331 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:01:47.281550 kubelet[2113]: I0209 19:01:47.281526 2113 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-vq8z6" podStartSLOduration=2.808793598 podCreationTimestamp="2024-02-09 19:01:40 +0000 UTC" firstStartedPulling="2024-02-09 19:01:42.180763452 +0000 UTC m=+3.479227052" lastFinishedPulling="2024-02-09 19:01:46.653408943 +0000 UTC m=+7.951872558" observedRunningTime="2024-02-09 19:01:47.280165217 +0000 UTC m=+8.578628819" watchObservedRunningTime="2024-02-09 19:01:47.281439104 +0000 UTC m=+8.579902725" Feb 9 19:01:47.281000 audit[2436]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.281000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb34fb160 a2=0 a3=7ffdb34fb14c items=0 ppid=2331 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:01:47.286000 audit[2438]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.286000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd17637f80 a2=0 a3=7ffd17637f6c items=0 ppid=2331 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:01:47.292000 audit[2441]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.292000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc07bca6a0 a2=0 a3=7ffc07bca68c items=0 ppid=2331 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:01:47.293000 audit[2442]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.293000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0aea4c90 a2=0 a3=7ffd0aea4c7c items=0 ppid=2331 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:01:47.299000 audit[2444]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.299000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda82c59b0 a2=0 a3=7ffda82c599c items=0 ppid=2331 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:01:47.301000 audit[2445]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.301000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7d42a420 a2=0 a3=7ffc7d42a40c items=0 ppid=2331 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:01:47.305000 audit[2447]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.305000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffad686c20 a2=0 a3=7fffad686c0c items=0 ppid=2331 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:01:47.311000 audit[2450]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.311000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd60666f0 a2=0 a3=7fffd60666dc items=0 ppid=2331 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:01:47.318000 audit[2453]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.318000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd59ab4d10 a2=0 a3=7ffd59ab4cfc items=0 ppid=2331 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:01:47.320000 audit[2454]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.320000 audit[2454]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdc2366250 a2=0 a3=7ffdc236623c items=0 ppid=2331 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:01:47.324000 audit[2456]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.324000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffbc6933b0 a2=0 a3=7fffbc69339c items=0 ppid=2331 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:01:47.331000 audit[2459]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.331000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd1e42b3d0 a2=0 a3=7ffd1e42b3bc items=0 ppid=2331 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:01:47.333000 audit[2460]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.333000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4109fbe0 a2=0 a3=7fff4109fbcc items=0 ppid=2331 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:01:47.336000 audit[2462]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.336000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe7fa3a630 a2=0 a3=7ffe7fa3a61c items=0 ppid=2331 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:01:47.341000 audit[2463]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2463 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.341000 audit[2463]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc41c4fca0 a2=0 a3=7ffc41c4fc8c items=0 ppid=2331 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:01:47.346000 audit[2465]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.346000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd7af88680 a2=0 a3=7ffd7af8866c items=0 ppid=2331 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:01:47.353000 audit[2468]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:01:47.353000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff7527e4b0 a2=0 a3=7fff7527e49c items=0 ppid=2331 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:01:47.357000 audit[2470]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:01:47.357000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd44349f40 a2=0 a3=7ffd44349f2c items=0 ppid=2331 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.357000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:47.359000 audit[2470]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:01:47.359000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd44349f40 a2=0 a3=7ffd44349f2c items=0 ppid=2331 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:47.359000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:47.668408 systemd[1]: run-containerd-runc-k8s.io-488550bb5f26a107ce8adbf513e0a688b8d5d7b2dfa4b2638d5db90fb9959c1c-runc.5N4RbD.mount: Deactivated successfully. Feb 9 19:01:48.057635 kubelet[2113]: E0209 19:01:48.057369 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:48.083794 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2476289139.mount: Deactivated successfully. Feb 9 19:01:49.057826 kubelet[2113]: E0209 19:01:49.057776 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:49.221210 kubelet[2113]: E0209 19:01:49.221165 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9kflt" podUID="bcda9d49-c3b9-4076-bd5b-bd9baea5b98e" Feb 9 19:01:50.058620 kubelet[2113]: E0209 19:01:50.058530 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:51.059734 kubelet[2113]: E0209 19:01:51.059687 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:51.219856 kubelet[2113]: E0209 19:01:51.219825 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9kflt" podUID="bcda9d49-c3b9-4076-bd5b-bd9baea5b98e" Feb 9 19:01:52.060388 kubelet[2113]: E0209 19:01:52.060321 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:52.639834 env[1643]: time="2024-02-09T19:01:52.639784241Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:52.642473 env[1643]: time="2024-02-09T19:01:52.642430301Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:52.644768 env[1643]: time="2024-02-09T19:01:52.644726264Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:52.647243 env[1643]: time="2024-02-09T19:01:52.647201824Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:52.648075 env[1643]: time="2024-02-09T19:01:52.648018310Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:01:52.650788 env[1643]: time="2024-02-09T19:01:52.650753509Z" level=info msg="CreateContainer within sandbox \"d403c68f47474e12325ab6a95faad06086f1b68c7123731acffd5ddba2479edf\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:01:52.666752 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1299209816.mount: Deactivated successfully. Feb 9 19:01:52.681469 env[1643]: time="2024-02-09T19:01:52.681368965Z" level=info msg="CreateContainer within sandbox \"d403c68f47474e12325ab6a95faad06086f1b68c7123731acffd5ddba2479edf\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"67c0de32d1ef351f924a515a664a55e0c6a5518601ebe1677ed8a72efc249a0f\"" Feb 9 19:01:52.682304 env[1643]: time="2024-02-09T19:01:52.682165834Z" level=info msg="StartContainer for \"67c0de32d1ef351f924a515a664a55e0c6a5518601ebe1677ed8a72efc249a0f\"" Feb 9 19:01:52.724308 systemd[1]: Started cri-containerd-67c0de32d1ef351f924a515a664a55e0c6a5518601ebe1677ed8a72efc249a0f.scope. Feb 9 19:01:52.757907 kernel: kauditd_printk_skb: 89 callbacks suppressed Feb 9 19:01:52.758561 kernel: audit: type=1400 audit(1707505312.745:728): avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2180 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:52.768258 kernel: audit: type=1300 audit(1707505312.745:728): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2180 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:52.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633064653332643165663335316639323461353135613636346135 Feb 9 19:01:52.781694 kernel: audit: type=1327 audit(1707505312.745:728): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633064653332643165663335316639323461353135613636346135 Feb 9 19:01:52.781854 kernel: audit: type=1400 audit(1707505312.745:729): avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.793367 kernel: audit: type=1400 audit(1707505312.745:729): avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.793517 kernel: audit: type=1400 audit(1707505312.745:729): avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.800150 env[1643]: time="2024-02-09T19:01:52.800006629Z" level=info msg="StartContainer for \"67c0de32d1ef351f924a515a664a55e0c6a5518601ebe1677ed8a72efc249a0f\" returns successfully" Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.817506 kernel: audit: type=1400 audit(1707505312.745:729): avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.817659 kernel: audit: type=1400 audit(1707505312.745:729): avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.823057 kernel: audit: type=1400 audit(1707505312.745:729): avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.745000 audit: BPF prog-id=90 op=LOAD Feb 9 19:01:52.745000 audit[2479]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000294ac0 items=0 ppid=2180 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:52.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633064653332643165663335316639323461353135613636346135 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.829126 kernel: audit: type=1400 audit(1707505312.745:729): avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit: BPF prog-id=91 op=LOAD Feb 9 19:01:52.757000 audit[2479]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000294b08 items=0 ppid=2180 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:52.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633064653332643165663335316639323461353135613636346135 Feb 9 19:01:52.757000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:01:52.757000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:52.757000 audit: BPF prog-id=92 op=LOAD Feb 9 19:01:52.757000 audit[2479]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000294b98 items=0 ppid=2180 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:52.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633064653332643165663335316639323461353135613636346135 Feb 9 19:01:53.061293 kubelet[2113]: E0209 19:01:53.061173 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:53.219704 kubelet[2113]: E0209 19:01:53.219662 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9kflt" podUID="bcda9d49-c3b9-4076-bd5b-bd9baea5b98e" Feb 9 19:01:54.035572 env[1643]: time="2024-02-09T19:01:54.034969982Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:01:54.040179 systemd[1]: cri-containerd-67c0de32d1ef351f924a515a664a55e0c6a5518601ebe1677ed8a72efc249a0f.scope: Deactivated successfully. Feb 9 19:01:54.043000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:01:54.062236 kubelet[2113]: E0209 19:01:54.062168 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:54.073765 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-67c0de32d1ef351f924a515a664a55e0c6a5518601ebe1677ed8a72efc249a0f-rootfs.mount: Deactivated successfully. Feb 9 19:01:54.116295 kubelet[2113]: I0209 19:01:54.116275 2113 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:01:54.462626 env[1643]: time="2024-02-09T19:01:54.462525020Z" level=info msg="shim disconnected" id=67c0de32d1ef351f924a515a664a55e0c6a5518601ebe1677ed8a72efc249a0f Feb 9 19:01:54.462626 env[1643]: time="2024-02-09T19:01:54.462626919Z" level=warning msg="cleaning up after shim disconnected" id=67c0de32d1ef351f924a515a664a55e0c6a5518601ebe1677ed8a72efc249a0f namespace=k8s.io Feb 9 19:01:54.462969 env[1643]: time="2024-02-09T19:01:54.462642286Z" level=info msg="cleaning up dead shim" Feb 9 19:01:54.475710 env[1643]: time="2024-02-09T19:01:54.475661803Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:01:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2525 runtime=io.containerd.runc.v2\n" Feb 9 19:01:54.987520 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 19:01:54.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:55.008000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:01:55.008000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:01:55.008000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:01:55.063075 kubelet[2113]: E0209 19:01:55.063024 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:55.228399 systemd[1]: Created slice kubepods-besteffort-podbcda9d49_c3b9_4076_bd5b_bd9baea5b98e.slice. Feb 9 19:01:55.236246 env[1643]: time="2024-02-09T19:01:55.235910913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9kflt,Uid:bcda9d49-c3b9-4076-bd5b-bd9baea5b98e,Namespace:calico-system,Attempt:0,}" Feb 9 19:01:55.321560 env[1643]: time="2024-02-09T19:01:55.321447243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:01:55.340360 env[1643]: time="2024-02-09T19:01:55.340281275Z" level=error msg="Failed to destroy network for sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:55.342258 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda-shm.mount: Deactivated successfully. Feb 9 19:01:55.343376 env[1643]: time="2024-02-09T19:01:55.343320616Z" level=error msg="encountered an error cleaning up failed sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:55.343486 env[1643]: time="2024-02-09T19:01:55.343399063Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9kflt,Uid:bcda9d49-c3b9-4076-bd5b-bd9baea5b98e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:55.343718 kubelet[2113]: E0209 19:01:55.343683 2113 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:55.343806 kubelet[2113]: E0209 19:01:55.343760 2113 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9kflt" Feb 9 19:01:55.343860 kubelet[2113]: E0209 19:01:55.343805 2113 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9kflt" Feb 9 19:01:55.343907 kubelet[2113]: E0209 19:01:55.343898 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9kflt_calico-system(bcda9d49-c3b9-4076-bd5b-bd9baea5b98e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9kflt_calico-system(bcda9d49-c3b9-4076-bd5b-bd9baea5b98e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9kflt" podUID="bcda9d49-c3b9-4076-bd5b-bd9baea5b98e" Feb 9 19:01:56.063679 kubelet[2113]: E0209 19:01:56.063628 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:56.322061 kubelet[2113]: I0209 19:01:56.321949 2113 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:01:56.323271 env[1643]: time="2024-02-09T19:01:56.323114446Z" level=info msg="StopPodSandbox for \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\"" Feb 9 19:01:56.361591 env[1643]: time="2024-02-09T19:01:56.361532830Z" level=error msg="StopPodSandbox for \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\" failed" error="failed to destroy network for sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:56.362026 kubelet[2113]: E0209 19:01:56.361994 2113 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:01:56.362186 kubelet[2113]: E0209 19:01:56.362112 2113 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda"} Feb 9 19:01:56.362186 kubelet[2113]: E0209 19:01:56.362163 2113 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:01:56.362323 kubelet[2113]: E0209 19:01:56.362202 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9kflt" podUID="bcda9d49-c3b9-4076-bd5b-bd9baea5b98e" Feb 9 19:01:57.064247 kubelet[2113]: E0209 19:01:57.064206 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:58.065158 kubelet[2113]: E0209 19:01:58.065118 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:59.050356 kubelet[2113]: E0209 19:01:59.050286 2113 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:59.065834 kubelet[2113]: E0209 19:01:59.065764 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:59.100872 kubelet[2113]: I0209 19:01:59.093072 2113 topology_manager.go:215] "Topology Admit Handler" podUID="3df298b3-eb90-43bd-b690-f97b2f1a930f" podNamespace="default" podName="nginx-deployment-6d5f899847-b6zkt" Feb 9 19:01:59.109196 systemd[1]: Created slice kubepods-besteffort-pod3df298b3_eb90_43bd_b690_f97b2f1a930f.slice. Feb 9 19:01:59.115474 kubelet[2113]: I0209 19:01:59.115448 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kkcsl\" (UniqueName: \"kubernetes.io/projected/3df298b3-eb90-43bd-b690-f97b2f1a930f-kube-api-access-kkcsl\") pod \"nginx-deployment-6d5f899847-b6zkt\" (UID: \"3df298b3-eb90-43bd-b690-f97b2f1a930f\") " pod="default/nginx-deployment-6d5f899847-b6zkt" Feb 9 19:01:59.420408 env[1643]: time="2024-02-09T19:01:59.420330356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-b6zkt,Uid:3df298b3-eb90-43bd-b690-f97b2f1a930f,Namespace:default,Attempt:0,}" Feb 9 19:01:59.625834 env[1643]: time="2024-02-09T19:01:59.625772220Z" level=error msg="Failed to destroy network for sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:59.628382 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13-shm.mount: Deactivated successfully. Feb 9 19:01:59.630254 env[1643]: time="2024-02-09T19:01:59.630194470Z" level=error msg="encountered an error cleaning up failed sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:59.630503 env[1643]: time="2024-02-09T19:01:59.630464383Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-b6zkt,Uid:3df298b3-eb90-43bd-b690-f97b2f1a930f,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:59.631972 kubelet[2113]: E0209 19:01:59.631169 2113 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:59.631972 kubelet[2113]: E0209 19:01:59.631308 2113 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-b6zkt" Feb 9 19:01:59.631972 kubelet[2113]: E0209 19:01:59.631345 2113 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-b6zkt" Feb 9 19:01:59.632268 kubelet[2113]: E0209 19:01:59.631467 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-b6zkt_default(3df298b3-eb90-43bd-b690-f97b2f1a930f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-b6zkt_default(3df298b3-eb90-43bd-b690-f97b2f1a930f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-b6zkt" podUID="3df298b3-eb90-43bd-b690-f97b2f1a930f" Feb 9 19:02:00.066004 kubelet[2113]: E0209 19:02:00.065925 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:00.170684 amazon-ssm-agent[1776]: 2024-02-09 19:02:00 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 9 19:02:00.332987 kubelet[2113]: I0209 19:02:00.332880 2113 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:00.334701 env[1643]: time="2024-02-09T19:02:00.334595431Z" level=info msg="StopPodSandbox for \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\"" Feb 9 19:02:00.417831 env[1643]: time="2024-02-09T19:02:00.417761822Z" level=error msg="StopPodSandbox for \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\" failed" error="failed to destroy network for sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:02:00.418822 kubelet[2113]: E0209 19:02:00.418351 2113 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:00.418822 kubelet[2113]: E0209 19:02:00.418659 2113 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13"} Feb 9 19:02:00.418822 kubelet[2113]: E0209 19:02:00.418719 2113 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3df298b3-eb90-43bd-b690-f97b2f1a930f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:02:00.418822 kubelet[2113]: E0209 19:02:00.418765 2113 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3df298b3-eb90-43bd-b690-f97b2f1a930f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-b6zkt" podUID="3df298b3-eb90-43bd-b690-f97b2f1a930f" Feb 9 19:02:01.067586 kubelet[2113]: E0209 19:02:01.067458 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:02.069360 kubelet[2113]: E0209 19:02:02.069316 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:03.071594 kubelet[2113]: E0209 19:02:03.071528 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:04.072611 kubelet[2113]: E0209 19:02:04.072545 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:04.416380 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1890660251.mount: Deactivated successfully. Feb 9 19:02:04.494113 env[1643]: time="2024-02-09T19:02:04.493821822Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:04.497567 env[1643]: time="2024-02-09T19:02:04.497380986Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:04.500882 env[1643]: time="2024-02-09T19:02:04.500833297Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:04.503470 env[1643]: time="2024-02-09T19:02:04.503410247Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:04.503935 env[1643]: time="2024-02-09T19:02:04.503898014Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:02:04.522737 env[1643]: time="2024-02-09T19:02:04.522682685Z" level=info msg="CreateContainer within sandbox \"d403c68f47474e12325ab6a95faad06086f1b68c7123731acffd5ddba2479edf\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:02:04.554569 env[1643]: time="2024-02-09T19:02:04.554514946Z" level=info msg="CreateContainer within sandbox \"d403c68f47474e12325ab6a95faad06086f1b68c7123731acffd5ddba2479edf\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"58a7b1223cedb4b48791b060c7490282fe4c19b8ed5078810501f87e15b2333c\"" Feb 9 19:02:04.555214 env[1643]: time="2024-02-09T19:02:04.555157765Z" level=info msg="StartContainer for \"58a7b1223cedb4b48791b060c7490282fe4c19b8ed5078810501f87e15b2333c\"" Feb 9 19:02:04.592127 systemd[1]: Started cri-containerd-58a7b1223cedb4b48791b060c7490282fe4c19b8ed5078810501f87e15b2333c.scope. Feb 9 19:02:04.629000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.632343 kernel: kauditd_printk_skb: 38 callbacks suppressed Feb 9 19:02:04.632541 kernel: audit: type=1400 audit(1707505324.629:739): avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.629000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2180 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:04.644153 kernel: audit: type=1300 audit(1707505324.629:739): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2180 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:04.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538613762313232336365646234623438373931623036306337343930 Feb 9 19:02:04.630000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.657699 kernel: audit: type=1327 audit(1707505324.629:739): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538613762313232336365646234623438373931623036306337343930 Feb 9 19:02:04.657912 kernel: audit: type=1400 audit(1707505324.630:740): avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.630000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.663187 kernel: audit: type=1400 audit(1707505324.630:740): avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.630000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.674812 kernel: audit: type=1400 audit(1707505324.630:740): avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.674955 kernel: audit: type=1400 audit(1707505324.630:740): avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.630000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.690162 kernel: audit: type=1400 audit(1707505324.630:740): avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.630000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.630000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.697879 kernel: audit: type=1400 audit(1707505324.630:740): avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.700291 kernel: audit: type=1400 audit(1707505324.630:740): avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.630000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.701050 env[1643]: time="2024-02-09T19:02:04.700991452Z" level=info msg="StartContainer for \"58a7b1223cedb4b48791b060c7490282fe4c19b8ed5078810501f87e15b2333c\" returns successfully" Feb 9 19:02:04.630000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.630000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.630000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.630000 audit: BPF prog-id=93 op=LOAD Feb 9 19:02:04.630000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000243f0 items=0 ppid=2180 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:04.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538613762313232336365646234623438373931623036306337343930 Feb 9 19:02:04.636000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.636000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.636000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.636000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.636000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.636000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.636000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.636000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.636000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.636000 audit: BPF prog-id=94 op=LOAD Feb 9 19:02:04.636000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024438 items=0 ppid=2180 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:04.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538613762313232336365646234623438373931623036306337343930 Feb 9 19:02:04.643000 audit: BPF prog-id=94 op=UNLOAD Feb 9 19:02:04.643000 audit: BPF prog-id=93 op=UNLOAD Feb 9 19:02:04.643000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.643000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.643000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.643000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.643000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.643000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.643000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.643000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.643000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.643000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:04.643000 audit: BPF prog-id=95 op=LOAD Feb 9 19:02:04.643000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000244c8 items=0 ppid=2180 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:04.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538613762313232336365646234623438373931623036306337343930 Feb 9 19:02:04.835726 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:02:04.835918 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:02:05.073753 kubelet[2113]: E0209 19:02:05.073621 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:06.074593 kubelet[2113]: E0209 19:02:06.074540 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:06.252000 audit[2765]: AVC avc: denied { write } for pid=2765 comm="tee" name="fd" dev="proc" ino=19188 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:02:06.252000 audit[2765]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3d4b9988 a2=241 a3=1b6 items=1 ppid=2730 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.252000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:02:06.252000 audit: PATH item=0 name="/dev/fd/63" inode=19185 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.255000 audit[2767]: AVC avc: denied { write } for pid=2767 comm="tee" name="fd" dev="proc" ino=19192 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:02:06.255000 audit[2767]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe49625979 a2=241 a3=1b6 items=1 ppid=2723 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.255000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:02:06.255000 audit: PATH item=0 name="/dev/fd/63" inode=19909 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.255000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:02:06.252000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:02:06.270000 audit[2756]: AVC avc: denied { write } for pid=2756 comm="tee" name="fd" dev="proc" ino=19922 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:02:06.270000 audit[2756]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5968b978 a2=241 a3=1b6 items=1 ppid=2724 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.270000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:02:06.270000 audit: PATH item=0 name="/dev/fd/63" inode=19178 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.270000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:02:06.285000 audit[2779]: AVC avc: denied { write } for pid=2779 comm="tee" name="fd" dev="proc" ino=19199 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:02:06.285000 audit[2779]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6a4b698a a2=241 a3=1b6 items=1 ppid=2727 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.285000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:02:06.285000 audit: PATH item=0 name="/dev/fd/63" inode=19194 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.285000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:02:06.284000 audit[2774]: AVC avc: denied { write } for pid=2774 comm="tee" name="fd" dev="proc" ino=19928 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:02:06.284000 audit[2774]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe7654988 a2=241 a3=1b6 items=1 ppid=2732 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.284000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:02:06.284000 audit: PATH item=0 name="/dev/fd/63" inode=19914 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.284000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:02:06.313000 audit[2789]: AVC avc: denied { write } for pid=2789 comm="tee" name="fd" dev="proc" ino=19942 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:02:06.313000 audit[2789]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9a94d989 a2=241 a3=1b6 items=1 ppid=2736 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.313000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:02:06.313000 audit: PATH item=0 name="/dev/fd/63" inode=19929 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.313000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:02:06.370000 audit[2798]: AVC avc: denied { write } for pid=2798 comm="tee" name="fd" dev="proc" ino=19203 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:02:06.370000 audit[2798]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc0c22988 a2=241 a3=1b6 items=1 ppid=2741 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.370000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:02:06.370000 audit: PATH item=0 name="/dev/fd/63" inode=19945 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.370000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:02:06.617175 kernel: Initializing XFRM netlink socket Feb 9 19:02:06.864990 (udev-worker)[2690]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:02:06.865885 (udev-worker)[2689]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:02:06.867000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.867000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.867000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.867000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.867000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.867000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.867000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.867000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.867000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.867000 audit: BPF prog-id=96 op=LOAD Feb 9 19:02:06.867000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc4000fbe0 a2=70 a3=7fd16da82000 items=0 ppid=2742 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.867000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:02:06.869000 audit: BPF prog-id=96 op=UNLOAD Feb 9 19:02:06.869000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.869000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.869000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.869000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.869000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.869000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.869000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.869000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.869000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.869000 audit: BPF prog-id=97 op=LOAD Feb 9 19:02:06.869000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc4000fbe0 a2=70 a3=6e items=0 ppid=2742 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.869000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:02:06.870000 audit: BPF prog-id=97 op=UNLOAD Feb 9 19:02:06.870000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.870000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc4000fb90 a2=70 a3=7ffc4000fbe0 items=0 ppid=2742 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:02:06.870000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.870000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.870000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.870000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.870000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.870000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.870000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.870000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.870000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.870000 audit: BPF prog-id=98 op=LOAD Feb 9 19:02:06.870000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc4000fb70 a2=70 a3=7ffc4000fbe0 items=0 ppid=2742 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:02:06.871000 audit: BPF prog-id=98 op=UNLOAD Feb 9 19:02:06.871000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.871000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc4000fc50 a2=70 a3=0 items=0 ppid=2742 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:02:06.871000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.871000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc4000fc40 a2=70 a3=0 items=0 ppid=2742 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:02:06.871000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.871000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc4000fc80 a2=70 a3=0 items=0 ppid=2742 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:02:06.873000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.873000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.873000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.873000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.873000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.873000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.873000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.873000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.873000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.873000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.873000 audit: BPF prog-id=99 op=LOAD Feb 9 19:02:06.873000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc4000fba0 a2=70 a3=ffffffff items=0 ppid=2742 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.873000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:02:06.878000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.878000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc40b720e0 a2=70 a3=fff80800 items=0 ppid=2742 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.878000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:02:06.879000 audit[2864]: AVC avc: denied { bpf } for pid=2864 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:06.879000 audit[2864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc40b71fb0 a2=70 a3=3 items=0 ppid=2742 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.879000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:02:06.890000 audit: BPF prog-id=99 op=UNLOAD Feb 9 19:02:07.016000 audit[2885]: NETFILTER_CFG table=raw:65 family=2 entries=19 op=nft_register_chain pid=2885 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:07.016000 audit[2885]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff8b40ab80 a2=0 a3=7fff8b40ab6c items=0 ppid=2742 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:07.016000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:07.018000 audit[2888]: NETFILTER_CFG table=mangle:66 family=2 entries=19 op=nft_register_chain pid=2888 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:07.018000 audit[2888]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff5acec930 a2=0 a3=555c482ca000 items=0 ppid=2742 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:07.018000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:07.023000 audit[2886]: NETFILTER_CFG table=nat:67 family=2 entries=16 op=nft_register_chain pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:07.023000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe82830db0 a2=0 a3=555b20bc6000 items=0 ppid=2742 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:07.023000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:07.030000 audit[2893]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2893 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:07.030000 audit[2893]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc28c4bab0 a2=0 a3=5638687a9000 items=0 ppid=2742 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:07.030000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:07.074716 kubelet[2113]: E0209 19:02:07.074666 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:07.173440 kubelet[2113]: I0209 19:02:07.173323 2113 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:02:07.634452 (udev-worker)[2868]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:02:07.636092 systemd-networkd[1459]: vxlan.calico: Link UP Feb 9 19:02:07.636099 systemd-networkd[1459]: vxlan.calico: Gained carrier Feb 9 19:02:08.075635 kubelet[2113]: E0209 19:02:08.075501 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:08.871496 systemd-networkd[1459]: vxlan.calico: Gained IPv6LL Feb 9 19:02:09.076831 kubelet[2113]: E0209 19:02:09.076780 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:09.999211 update_engine[1637]: I0209 19:02:09.999145 1637 update_attempter.cc:509] Updating boot flags... Feb 9 19:02:10.078482 kubelet[2113]: E0209 19:02:10.077644 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:10.219990 env[1643]: time="2024-02-09T19:02:10.219945681Z" level=info msg="StopPodSandbox for \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\"" Feb 9 19:02:10.414113 kubelet[2113]: I0209 19:02:10.414076 2113 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-lgdzt" podStartSLOduration=8.071142934 podCreationTimestamp="2024-02-09 19:01:40 +0000 UTC" firstStartedPulling="2024-02-09 19:01:42.161722565 +0000 UTC m=+3.460186174" lastFinishedPulling="2024-02-09 19:02:04.50454935 +0000 UTC m=+25.803012963" observedRunningTime="2024-02-09 19:02:05.388244488 +0000 UTC m=+26.686708089" watchObservedRunningTime="2024-02-09 19:02:10.413969723 +0000 UTC m=+31.712433338" Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.412 [INFO][3048] k8s.go 578: Cleaning up netns ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.413 [INFO][3048] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" iface="eth0" netns="/var/run/netns/cni-b93f78f4-1a01-2bc6-2272-73c4396fdb37" Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.418 [INFO][3048] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" iface="eth0" netns="/var/run/netns/cni-b93f78f4-1a01-2bc6-2272-73c4396fdb37" Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.429 [INFO][3048] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" iface="eth0" netns="/var/run/netns/cni-b93f78f4-1a01-2bc6-2272-73c4396fdb37" Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.429 [INFO][3048] k8s.go 585: Releasing IP address(es) ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.429 [INFO][3048] utils.go 188: Calico CNI releasing IP address ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.679 [INFO][3136] ipam_plugin.go 415: Releasing address using handleID ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" HandleID="k8s-pod-network.46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.679 [INFO][3136] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.679 [INFO][3136] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.694 [WARNING][3136] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" HandleID="k8s-pod-network.46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.694 [INFO][3136] ipam_plugin.go 443: Releasing address using workloadID ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" HandleID="k8s-pod-network.46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.696 [INFO][3136] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:10.705083 env[1643]: 2024-02-09 19:02:10.698 [INFO][3048] k8s.go 591: Teardown processing complete. ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:10.704451 systemd[1]: run-netns-cni\x2db93f78f4\x2d1a01\x2d2bc6\x2d2272\x2d73c4396fdb37.mount: Deactivated successfully. Feb 9 19:02:10.709353 env[1643]: time="2024-02-09T19:02:10.707936632Z" level=info msg="TearDown network for sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\" successfully" Feb 9 19:02:10.709353 env[1643]: time="2024-02-09T19:02:10.707983233Z" level=info msg="StopPodSandbox for \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\" returns successfully" Feb 9 19:02:10.709452 env[1643]: time="2024-02-09T19:02:10.709412713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9kflt,Uid:bcda9d49-c3b9-4076-bd5b-bd9baea5b98e,Namespace:calico-system,Attempt:1,}" Feb 9 19:02:10.928855 (udev-worker)[2869]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:02:10.929456 systemd-networkd[1459]: cali7c591965e67: Link UP Feb 9 19:02:10.933973 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:02:10.934099 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7c591965e67: link becomes ready Feb 9 19:02:10.934292 systemd-networkd[1459]: cali7c591965e67: Gained carrier Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.802 [INFO][3146] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.121-k8s-csi--node--driver--9kflt-eth0 csi-node-driver- calico-system bcda9d49-c3b9-4076-bd5b-bd9baea5b98e 927 0 2024-02-09 19:01:40 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.121 csi-node-driver-9kflt eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali7c591965e67 [] []}} ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Namespace="calico-system" Pod="csi-node-driver-9kflt" WorkloadEndpoint="172.31.22.121-k8s-csi--node--driver--9kflt-" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.805 [INFO][3146] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Namespace="calico-system" Pod="csi-node-driver-9kflt" WorkloadEndpoint="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.854 [INFO][3158] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" HandleID="k8s-pod-network.7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.870 [INFO][3158] ipam_plugin.go 268: Auto assigning IP ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" HandleID="k8s-pod-network.7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d9d0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.22.121", "pod":"csi-node-driver-9kflt", "timestamp":"2024-02-09 19:02:10.854139901 +0000 UTC"}, Hostname:"172.31.22.121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.870 [INFO][3158] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.870 [INFO][3158] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.870 [INFO][3158] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.121' Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.873 [INFO][3158] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" host="172.31.22.121" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.889 [INFO][3158] ipam.go 372: Looking up existing affinities for host host="172.31.22.121" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.899 [INFO][3158] ipam.go 489: Trying affinity for 192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.904 [INFO][3158] ipam.go 155: Attempting to load block cidr=192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.907 [INFO][3158] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.907 [INFO][3158] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.116.192/26 handle="k8s-pod-network.7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" host="172.31.22.121" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.912 [INFO][3158] ipam.go 1682: Creating new handle: k8s-pod-network.7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.917 [INFO][3158] ipam.go 1203: Writing block in order to claim IPs block=192.168.116.192/26 handle="k8s-pod-network.7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" host="172.31.22.121" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.922 [INFO][3158] ipam.go 1216: Successfully claimed IPs: [192.168.116.193/26] block=192.168.116.192/26 handle="k8s-pod-network.7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" host="172.31.22.121" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.922 [INFO][3158] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.116.193/26] handle="k8s-pod-network.7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" host="172.31.22.121" Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.922 [INFO][3158] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:10.959433 env[1643]: 2024-02-09 19:02:10.922 [INFO][3158] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.116.193/26] IPv6=[] ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" HandleID="k8s-pod-network.7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:10.960573 env[1643]: 2024-02-09 19:02:10.924 [INFO][3146] k8s.go 385: Populated endpoint ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Namespace="calico-system" Pod="csi-node-driver-9kflt" WorkloadEndpoint="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-csi--node--driver--9kflt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"", Pod:"csi-node-driver-9kflt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7c591965e67", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:10.960573 env[1643]: 2024-02-09 19:02:10.924 [INFO][3146] k8s.go 386: Calico CNI using IPs: [192.168.116.193/32] ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Namespace="calico-system" Pod="csi-node-driver-9kflt" WorkloadEndpoint="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:10.960573 env[1643]: 2024-02-09 19:02:10.924 [INFO][3146] dataplane_linux.go 68: Setting the host side veth name to cali7c591965e67 ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Namespace="calico-system" Pod="csi-node-driver-9kflt" WorkloadEndpoint="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:10.960573 env[1643]: 2024-02-09 19:02:10.935 [INFO][3146] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Namespace="calico-system" Pod="csi-node-driver-9kflt" WorkloadEndpoint="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:10.960573 env[1643]: 2024-02-09 19:02:10.937 [INFO][3146] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Namespace="calico-system" Pod="csi-node-driver-9kflt" WorkloadEndpoint="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-csi--node--driver--9kflt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc", Pod:"csi-node-driver-9kflt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7c591965e67", MAC:"82:cf:84:76:96:cf", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:10.960573 env[1643]: 2024-02-09 19:02:10.955 [INFO][3146] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc" Namespace="calico-system" Pod="csi-node-driver-9kflt" WorkloadEndpoint="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:10.991306 env[1643]: time="2024-02-09T19:02:10.991199324Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:02:10.991491 env[1643]: time="2024-02-09T19:02:10.991347379Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:02:10.991491 env[1643]: time="2024-02-09T19:02:10.991398874Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:02:10.991638 env[1643]: time="2024-02-09T19:02:10.991598868Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc pid=3184 runtime=io.containerd.runc.v2 Feb 9 19:02:11.019619 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 9 19:02:11.019752 kernel: audit: type=1325 audit(1707505331.010:770): table=filter:69 family=2 entries=36 op=nft_register_chain pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:11.010000 audit[3197]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:11.010000 audit[3197]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc333a8ed0 a2=0 a3=7ffc333a8ebc items=0 ppid=2742 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:11.022598 systemd[1]: Started cri-containerd-7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc.scope. Feb 9 19:02:11.031973 kernel: audit: type=1300 audit(1707505331.010:770): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc333a8ed0 a2=0 a3=7ffc333a8ebc items=0 ppid=2742 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:11.010000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:11.041366 kernel: audit: type=1327 audit(1707505331.010:770): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:11.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.077117 kernel: audit: type=1400 audit(1707505331.068:771): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.077189 kernel: audit: type=1400 audit(1707505331.068:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.084449 kubelet[2113]: E0209 19:02:11.084394 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:11.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.091805 kernel: audit: type=1400 audit(1707505331.068:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.094070 kernel: audit: type=1400 audit(1707505331.068:774): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.104726 kernel: audit: type=1400 audit(1707505331.068:775): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.104930 kernel: audit: type=1400 audit(1707505331.068:776): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.115228 kernel: audit: type=1400 audit(1707505331.068:777): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.075000 audit: BPF prog-id=100 op=LOAD Feb 9 19:02:11.075000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.075000 audit[3195]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3184 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:11.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765626236346132323966636165316335366635376239363738613566 Feb 9 19:02:11.075000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.075000 audit[3195]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3184 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:11.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765626236346132323966636165316335366635376239363738613566 Feb 9 19:02:11.076000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.076000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.076000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.076000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.076000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.076000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.076000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.076000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.076000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.076000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.076000 audit: BPF prog-id=101 op=LOAD Feb 9 19:02:11.076000 audit[3195]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003366f0 items=0 ppid=3184 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:11.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765626236346132323966636165316335366635376239363738613566 Feb 9 19:02:11.083000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.083000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.083000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.083000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.083000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.083000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.083000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.083000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.083000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.083000 audit: BPF prog-id=102 op=LOAD Feb 9 19:02:11.083000 audit[3195]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000336738 items=0 ppid=3184 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:11.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765626236346132323966636165316335366635376239363738613566 Feb 9 19:02:11.092000 audit: BPF prog-id=102 op=UNLOAD Feb 9 19:02:11.092000 audit: BPF prog-id=101 op=UNLOAD Feb 9 19:02:11.092000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.092000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.092000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.092000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.092000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.092000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.092000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.092000 audit[3195]: AVC avc: denied { perfmon } for pid=3195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.092000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.092000 audit[3195]: AVC avc: denied { bpf } for pid=3195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:11.092000 audit: BPF prog-id=103 op=LOAD Feb 9 19:02:11.092000 audit[3195]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000336b48 items=0 ppid=3184 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:11.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765626236346132323966636165316335366635376239363738613566 Feb 9 19:02:11.144617 env[1643]: time="2024-02-09T19:02:11.144567287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9kflt,Uid:bcda9d49-c3b9-4076-bd5b-bd9baea5b98e,Namespace:calico-system,Attempt:1,} returns sandbox id \"7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc\"" Feb 9 19:02:11.152883 env[1643]: time="2024-02-09T19:02:11.152798707Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:02:12.084625 kubelet[2113]: E0209 19:02:12.084575 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:12.136140 systemd-networkd[1459]: cali7c591965e67: Gained IPv6LL Feb 9 19:02:12.458871 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1795731158.mount: Deactivated successfully. Feb 9 19:02:13.005147 env[1643]: time="2024-02-09T19:02:13.005090217Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:13.008562 env[1643]: time="2024-02-09T19:02:13.008454190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:13.010960 env[1643]: time="2024-02-09T19:02:13.010917732Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:13.013071 env[1643]: time="2024-02-09T19:02:13.012941432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:13.014653 env[1643]: time="2024-02-09T19:02:13.014567236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:02:13.019659 env[1643]: time="2024-02-09T19:02:13.019616200Z" level=info msg="CreateContainer within sandbox \"7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:02:13.056577 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2619152757.mount: Deactivated successfully. Feb 9 19:02:13.067835 env[1643]: time="2024-02-09T19:02:13.067715438Z" level=info msg="CreateContainer within sandbox \"7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ef65d92f2026f30ddc9a48732e733a175da73cb600fc9e3d61fd3b1be22e7cb3\"" Feb 9 19:02:13.069825 env[1643]: time="2024-02-09T19:02:13.069787071Z" level=info msg="StartContainer for \"ef65d92f2026f30ddc9a48732e733a175da73cb600fc9e3d61fd3b1be22e7cb3\"" Feb 9 19:02:13.089892 kubelet[2113]: E0209 19:02:13.089322 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:13.135288 systemd[1]: Started cri-containerd-ef65d92f2026f30ddc9a48732e733a175da73cb600fc9e3d61fd3b1be22e7cb3.scope. Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3184 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:13.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363564393266323032366633306464633961343837333265373333 Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.173000 audit: BPF prog-id=104 op=LOAD Feb 9 19:02:13.173000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024660 items=0 ppid=3184 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:13.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363564393266323032366633306464633961343837333265373333 Feb 9 19:02:13.174000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.174000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.174000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.174000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.174000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.174000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.174000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.174000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.174000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.174000 audit: BPF prog-id=105 op=LOAD Feb 9 19:02:13.174000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000246a8 items=0 ppid=3184 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:13.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363564393266323032366633306464633961343837333265373333 Feb 9 19:02:13.174000 audit: BPF prog-id=105 op=UNLOAD Feb 9 19:02:13.175000 audit: BPF prog-id=104 op=UNLOAD Feb 9 19:02:13.175000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.175000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.175000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.175000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.175000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.175000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.175000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.175000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.175000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.175000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:13.175000 audit: BPF prog-id=106 op=LOAD Feb 9 19:02:13.175000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024738 items=0 ppid=3184 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:13.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363564393266323032366633306464633961343837333265373333 Feb 9 19:02:13.216557 env[1643]: time="2024-02-09T19:02:13.216455995Z" level=info msg="StartContainer for \"ef65d92f2026f30ddc9a48732e733a175da73cb600fc9e3d61fd3b1be22e7cb3\" returns successfully" Feb 9 19:02:13.225222 env[1643]: time="2024-02-09T19:02:13.225179773Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:02:14.089494 kubelet[2113]: E0209 19:02:14.089431 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:14.223640 env[1643]: time="2024-02-09T19:02:14.223550625Z" level=info msg="StopPodSandbox for \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\"" Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.303 [INFO][3279] k8s.go 578: Cleaning up netns ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.305 [INFO][3279] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" iface="eth0" netns="/var/run/netns/cni-adedc117-6b7f-e381-0d6e-920f4abea14a" Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.332 [INFO][3279] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" iface="eth0" netns="/var/run/netns/cni-adedc117-6b7f-e381-0d6e-920f4abea14a" Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.333 [INFO][3279] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" iface="eth0" netns="/var/run/netns/cni-adedc117-6b7f-e381-0d6e-920f4abea14a" Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.333 [INFO][3279] k8s.go 585: Releasing IP address(es) ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.333 [INFO][3279] utils.go 188: Calico CNI releasing IP address ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.372 [INFO][3286] ipam_plugin.go 415: Releasing address using handleID ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" HandleID="k8s-pod-network.133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.373 [INFO][3286] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.373 [INFO][3286] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.393 [WARNING][3286] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" HandleID="k8s-pod-network.133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.393 [INFO][3286] ipam_plugin.go 443: Releasing address using workloadID ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" HandleID="k8s-pod-network.133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.398 [INFO][3286] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:14.406317 env[1643]: 2024-02-09 19:02:14.400 [INFO][3279] k8s.go 591: Teardown processing complete. ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:14.406317 env[1643]: time="2024-02-09T19:02:14.405653321Z" level=info msg="TearDown network for sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\" successfully" Feb 9 19:02:14.406317 env[1643]: time="2024-02-09T19:02:14.405703516Z" level=info msg="StopPodSandbox for \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\" returns successfully" Feb 9 19:02:14.405097 systemd[1]: run-netns-cni\x2dadedc117\x2d6b7f\x2de381\x2d0d6e\x2d920f4abea14a.mount: Deactivated successfully. Feb 9 19:02:14.407979 env[1643]: time="2024-02-09T19:02:14.407803749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-b6zkt,Uid:3df298b3-eb90-43bd-b690-f97b2f1a930f,Namespace:default,Attempt:1,}" Feb 9 19:02:14.647732 systemd-networkd[1459]: calic010e87561d: Link UP Feb 9 19:02:14.655762 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:02:14.655922 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic010e87561d: link becomes ready Feb 9 19:02:14.657539 systemd-networkd[1459]: calic010e87561d: Gained carrier Feb 9 19:02:14.657975 (udev-worker)[3310]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.502 [INFO][3292] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0 nginx-deployment-6d5f899847- default 3df298b3-eb90-43bd-b690-f97b2f1a930f 946 0 2024-02-09 19:01:59 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.121 nginx-deployment-6d5f899847-b6zkt eth0 default [] [] [kns.default ksa.default.default] calic010e87561d [] []}} ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Namespace="default" Pod="nginx-deployment-6d5f899847-b6zkt" WorkloadEndpoint="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.503 [INFO][3292] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Namespace="default" Pod="nginx-deployment-6d5f899847-b6zkt" WorkloadEndpoint="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.566 [INFO][3303] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" HandleID="k8s-pod-network.e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.582 [INFO][3303] ipam_plugin.go 268: Auto assigning IP ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" HandleID="k8s-pod-network.e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000501ba0), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.121", "pod":"nginx-deployment-6d5f899847-b6zkt", "timestamp":"2024-02-09 19:02:14.566359977 +0000 UTC"}, Hostname:"172.31.22.121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.583 [INFO][3303] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.583 [INFO][3303] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.584 [INFO][3303] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.121' Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.588 [INFO][3303] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" host="172.31.22.121" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.601 [INFO][3303] ipam.go 372: Looking up existing affinities for host host="172.31.22.121" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.612 [INFO][3303] ipam.go 489: Trying affinity for 192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.615 [INFO][3303] ipam.go 155: Attempting to load block cidr=192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.618 [INFO][3303] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.618 [INFO][3303] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.116.192/26 handle="k8s-pod-network.e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" host="172.31.22.121" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.620 [INFO][3303] ipam.go 1682: Creating new handle: k8s-pod-network.e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9 Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.625 [INFO][3303] ipam.go 1203: Writing block in order to claim IPs block=192.168.116.192/26 handle="k8s-pod-network.e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" host="172.31.22.121" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.630 [INFO][3303] ipam.go 1216: Successfully claimed IPs: [192.168.116.194/26] block=192.168.116.192/26 handle="k8s-pod-network.e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" host="172.31.22.121" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.631 [INFO][3303] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.116.194/26] handle="k8s-pod-network.e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" host="172.31.22.121" Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.631 [INFO][3303] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:14.694078 env[1643]: 2024-02-09 19:02:14.631 [INFO][3303] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.116.194/26] IPv6=[] ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" HandleID="k8s-pod-network.e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:14.697638 env[1643]: 2024-02-09 19:02:14.634 [INFO][3292] k8s.go 385: Populated endpoint ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Namespace="default" Pod="nginx-deployment-6d5f899847-b6zkt" WorkloadEndpoint="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"3df298b3-eb90-43bd-b690-f97b2f1a930f", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"", Pod:"nginx-deployment-6d5f899847-b6zkt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic010e87561d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:14.697638 env[1643]: 2024-02-09 19:02:14.637 [INFO][3292] k8s.go 386: Calico CNI using IPs: [192.168.116.194/32] ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Namespace="default" Pod="nginx-deployment-6d5f899847-b6zkt" WorkloadEndpoint="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:14.697638 env[1643]: 2024-02-09 19:02:14.637 [INFO][3292] dataplane_linux.go 68: Setting the host side veth name to calic010e87561d ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Namespace="default" Pod="nginx-deployment-6d5f899847-b6zkt" WorkloadEndpoint="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:14.697638 env[1643]: 2024-02-09 19:02:14.648 [INFO][3292] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Namespace="default" Pod="nginx-deployment-6d5f899847-b6zkt" WorkloadEndpoint="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:14.697638 env[1643]: 2024-02-09 19:02:14.666 [INFO][3292] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Namespace="default" Pod="nginx-deployment-6d5f899847-b6zkt" WorkloadEndpoint="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"3df298b3-eb90-43bd-b690-f97b2f1a930f", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9", Pod:"nginx-deployment-6d5f899847-b6zkt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic010e87561d", MAC:"9a:25:3a:a4:ca:fb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:14.697638 env[1643]: 2024-02-09 19:02:14.677 [INFO][3292] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9" Namespace="default" Pod="nginx-deployment-6d5f899847-b6zkt" WorkloadEndpoint="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:14.715000 audit[3328]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=3328 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:14.715000 audit[3328]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7fff08c7b5b0 a2=0 a3=7fff08c7b59c items=0 ppid=2742 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:14.715000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:14.740190 env[1643]: time="2024-02-09T19:02:14.740087484Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:02:14.740190 env[1643]: time="2024-02-09T19:02:14.740153552Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:02:14.740468 env[1643]: time="2024-02-09T19:02:14.740435742Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:02:14.740757 env[1643]: time="2024-02-09T19:02:14.740722774Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9 pid=3336 runtime=io.containerd.runc.v2 Feb 9 19:02:14.778994 systemd[1]: Started cri-containerd-e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9.scope. Feb 9 19:02:14.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.803000 audit: BPF prog-id=107 op=LOAD Feb 9 19:02:14.803000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.803000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3336 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:14.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536323334383038356436653834393762613734613535316337383031 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3336 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:14.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536323334383038356436653834393762613734613535316337383031 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit: BPF prog-id=108 op=LOAD Feb 9 19:02:14.804000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002421f0 items=0 ppid=3336 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:14.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536323334383038356436653834393762613734613535316337383031 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit: BPF prog-id=109 op=LOAD Feb 9 19:02:14.804000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000242238 items=0 ppid=3336 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:14.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536323334383038356436653834393762613734613535316337383031 Feb 9 19:02:14.804000 audit: BPF prog-id=109 op=UNLOAD Feb 9 19:02:14.804000 audit: BPF prog-id=108 op=UNLOAD Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:14.804000 audit: BPF prog-id=110 op=LOAD Feb 9 19:02:14.804000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000242648 items=0 ppid=3336 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:14.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536323334383038356436653834393762613734613535316337383031 Feb 9 19:02:14.854895 env[1643]: time="2024-02-09T19:02:14.854836645Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-b6zkt,Uid:3df298b3-eb90-43bd-b690-f97b2f1a930f,Namespace:default,Attempt:1,} returns sandbox id \"e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9\"" Feb 9 19:02:15.063122 env[1643]: time="2024-02-09T19:02:15.060509830Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:15.066230 env[1643]: time="2024-02-09T19:02:15.066183203Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:15.072667 env[1643]: time="2024-02-09T19:02:15.072618532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:15.075880 env[1643]: time="2024-02-09T19:02:15.075710593Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:15.076421 env[1643]: time="2024-02-09T19:02:15.076378732Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:02:15.078055 env[1643]: time="2024-02-09T19:02:15.077988059Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:02:15.081026 env[1643]: time="2024-02-09T19:02:15.080987290Z" level=info msg="CreateContainer within sandbox \"7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:02:15.090238 kubelet[2113]: E0209 19:02:15.090190 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:15.106197 env[1643]: time="2024-02-09T19:02:15.106143240Z" level=info msg="CreateContainer within sandbox \"7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"92c37eb5b06a0a9181f20394630a76dfbc488a817d2e08f1dba8155375f2877b\"" Feb 9 19:02:15.107188 env[1643]: time="2024-02-09T19:02:15.107152966Z" level=info msg="StartContainer for \"92c37eb5b06a0a9181f20394630a76dfbc488a817d2e08f1dba8155375f2877b\"" Feb 9 19:02:15.131414 systemd[1]: Started cri-containerd-92c37eb5b06a0a9181f20394630a76dfbc488a817d2e08f1dba8155375f2877b.scope. Feb 9 19:02:15.194000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.194000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3184 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:15.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932633337656235623036613061393138316632303339343633306137 Feb 9 19:02:15.198000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.198000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.198000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.198000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.198000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.198000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.198000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.198000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.198000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.198000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.198000 audit: BPF prog-id=111 op=LOAD Feb 9 19:02:15.198000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d4040 items=0 ppid=3184 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:15.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932633337656235623036613061393138316632303339343633306137 Feb 9 19:02:15.202000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.202000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.202000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.202000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.202000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.202000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.202000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.202000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.202000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.202000 audit: BPF prog-id=112 op=LOAD Feb 9 19:02:15.202000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d4088 items=0 ppid=3184 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:15.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932633337656235623036613061393138316632303339343633306137 Feb 9 19:02:15.204000 audit: BPF prog-id=112 op=UNLOAD Feb 9 19:02:15.204000 audit: BPF prog-id=111 op=UNLOAD Feb 9 19:02:15.205000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.205000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.205000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.205000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.205000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.205000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.205000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.205000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.205000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.205000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:15.205000 audit: BPF prog-id=113 op=LOAD Feb 9 19:02:15.205000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d4118 items=0 ppid=3184 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:15.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932633337656235623036613061393138316632303339343633306137 Feb 9 19:02:15.262685 env[1643]: time="2024-02-09T19:02:15.262615384Z" level=info msg="StartContainer for \"92c37eb5b06a0a9181f20394630a76dfbc488a817d2e08f1dba8155375f2877b\" returns successfully" Feb 9 19:02:15.429209 systemd[1]: run-containerd-runc-k8s.io-e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9-runc.sTLPq2.mount: Deactivated successfully. Feb 9 19:02:15.432115 kubelet[2113]: I0209 19:02:15.432024 2113 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-9kflt" podStartSLOduration=31.507252056 podCreationTimestamp="2024-02-09 19:01:40 +0000 UTC" firstStartedPulling="2024-02-09 19:02:11.152121191 +0000 UTC m=+32.450584805" lastFinishedPulling="2024-02-09 19:02:15.076853803 +0000 UTC m=+36.375317406" observedRunningTime="2024-02-09 19:02:15.43173661 +0000 UTC m=+36.730200232" watchObservedRunningTime="2024-02-09 19:02:15.431984657 +0000 UTC m=+36.730448278" Feb 9 19:02:16.090810 kubelet[2113]: E0209 19:02:16.090757 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:16.188188 kubelet[2113]: I0209 19:02:16.188138 2113 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:02:16.188909 kubelet[2113]: I0209 19:02:16.188885 2113 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:02:16.679783 systemd-networkd[1459]: calic010e87561d: Gained IPv6LL Feb 9 19:02:17.091581 kubelet[2113]: E0209 19:02:17.091539 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:18.092046 kubelet[2113]: E0209 19:02:18.091963 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:18.633515 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount64358197.mount: Deactivated successfully. Feb 9 19:02:19.050938 kubelet[2113]: E0209 19:02:19.050686 2113 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:19.092303 kubelet[2113]: E0209 19:02:19.092245 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:19.914179 env[1643]: time="2024-02-09T19:02:19.914127256Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:19.917230 env[1643]: time="2024-02-09T19:02:19.917184437Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:19.920086 env[1643]: time="2024-02-09T19:02:19.919931742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:19.923414 env[1643]: time="2024-02-09T19:02:19.923322047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:19.924191 env[1643]: time="2024-02-09T19:02:19.924155507Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:02:19.927069 env[1643]: time="2024-02-09T19:02:19.927007690Z" level=info msg="CreateContainer within sandbox \"e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 19:02:19.944537 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2361541370.mount: Deactivated successfully. Feb 9 19:02:19.955893 env[1643]: time="2024-02-09T19:02:19.955832600Z" level=info msg="CreateContainer within sandbox \"e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"977570b0bdc386d7aad9b9648656ef4a861684bca7cf0910447c8904dafca59f\"" Feb 9 19:02:19.956812 env[1643]: time="2024-02-09T19:02:19.956751223Z" level=info msg="StartContainer for \"977570b0bdc386d7aad9b9648656ef4a861684bca7cf0910447c8904dafca59f\"" Feb 9 19:02:20.046020 systemd[1]: Started cri-containerd-977570b0bdc386d7aad9b9648656ef4a861684bca7cf0910447c8904dafca59f.scope. Feb 9 19:02:20.093456 kubelet[2113]: E0209 19:02:20.093416 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:20.107092 kernel: kauditd_printk_skb: 196 callbacks suppressed Feb 9 19:02:20.108352 kernel: audit: type=1400 audit(1707505340.100:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.127691 kernel: audit: type=1400 audit(1707505340.100:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.144319 kernel: audit: type=1400 audit(1707505340.100:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.144714 kernel: audit: type=1400 audit(1707505340.100:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.144806 kernel: audit: type=1400 audit(1707505340.100:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.153029 kernel: audit: type=1400 audit(1707505340.100:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.176316 kernel: audit: type=1400 audit(1707505340.100:826): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.176657 kernel: audit: type=1400 audit(1707505340.100:827): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.176714 kernel: audit: type=1400 audit(1707505340.100:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.186725 kernel: audit: type=1400 audit(1707505340.105:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.105000 audit: BPF prog-id=114 op=LOAD Feb 9 19:02:20.105000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.105000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3336 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:20.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937373537306230626463333836643761616439623936343836353665 Feb 9 19:02:20.105000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.105000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=3336 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:20.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937373537306230626463333836643761616439623936343836353665 Feb 9 19:02:20.114000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.114000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.114000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.114000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.114000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.114000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.114000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.114000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.114000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.114000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.114000 audit: BPF prog-id=115 op=LOAD Feb 9 19:02:20.114000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000024390 items=0 ppid=3336 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:20.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937373537306230626463333836643761616439623936343836353665 Feb 9 19:02:20.118000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.118000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.118000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.118000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.118000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.118000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.118000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.118000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.118000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.118000 audit: BPF prog-id=116 op=LOAD Feb 9 19:02:20.118000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0000243d8 items=0 ppid=3336 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:20.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937373537306230626463333836643761616439623936343836353665 Feb 9 19:02:20.145000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:02:20.146000 audit: BPF prog-id=115 op=UNLOAD Feb 9 19:02:20.146000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.146000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.146000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.146000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.146000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.146000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.146000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.146000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.146000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.146000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:20.146000 audit: BPF prog-id=117 op=LOAD Feb 9 19:02:20.146000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0000247e8 items=0 ppid=3336 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:20.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937373537306230626463333836643761616439623936343836353665 Feb 9 19:02:20.214385 env[1643]: time="2024-02-09T19:02:20.213239034Z" level=info msg="StartContainer for \"977570b0bdc386d7aad9b9648656ef4a861684bca7cf0910447c8904dafca59f\" returns successfully" Feb 9 19:02:20.450747 kubelet[2113]: I0209 19:02:20.449307 2113 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-b6zkt" podStartSLOduration=16.381119393 podCreationTimestamp="2024-02-09 19:01:59 +0000 UTC" firstStartedPulling="2024-02-09 19:02:14.856666179 +0000 UTC m=+36.155129786" lastFinishedPulling="2024-02-09 19:02:19.924600351 +0000 UTC m=+41.223063963" observedRunningTime="2024-02-09 19:02:20.448648769 +0000 UTC m=+41.747112391" watchObservedRunningTime="2024-02-09 19:02:20.44905357 +0000 UTC m=+41.747517185" Feb 9 19:02:20.938848 systemd[1]: run-containerd-runc-k8s.io-977570b0bdc386d7aad9b9648656ef4a861684bca7cf0910447c8904dafca59f-runc.9Yo9xi.mount: Deactivated successfully. Feb 9 19:02:21.093666 kubelet[2113]: E0209 19:02:21.093628 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:22.094675 kubelet[2113]: E0209 19:02:22.094632 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:23.095174 kubelet[2113]: E0209 19:02:23.095123 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:24.096278 kubelet[2113]: E0209 19:02:24.096063 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:24.116000 audit[3474]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=3474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:24.116000 audit[3474]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd3fab27d0 a2=0 a3=7ffd3fab27bc items=0 ppid=2331 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:24.116000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:24.120000 audit[3474]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=3474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:24.120000 audit[3474]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd3fab27d0 a2=0 a3=31030 items=0 ppid=2331 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:24.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:24.151347 kubelet[2113]: I0209 19:02:24.151098 2113 topology_manager.go:215] "Topology Admit Handler" podUID="ed2bbdef-7194-40c6-b258-69580eb9d772" podNamespace="default" podName="nfs-server-provisioner-0" Feb 9 19:02:24.158000 audit[3479]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=3479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:24.158000 audit[3479]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd0873bba0 a2=0 a3=7ffd0873bb8c items=0 ppid=2331 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:24.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:24.159373 systemd[1]: Created slice kubepods-besteffort-poded2bbdef_7194_40c6_b258_69580eb9d772.slice. Feb 9 19:02:24.160000 audit[3479]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=3479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:24.160000 audit[3479]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd0873bba0 a2=0 a3=31030 items=0 ppid=2331 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:24.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:24.309406 kubelet[2113]: I0209 19:02:24.309368 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rndpl\" (UniqueName: \"kubernetes.io/projected/ed2bbdef-7194-40c6-b258-69580eb9d772-kube-api-access-rndpl\") pod \"nfs-server-provisioner-0\" (UID: \"ed2bbdef-7194-40c6-b258-69580eb9d772\") " pod="default/nfs-server-provisioner-0" Feb 9 19:02:24.309654 kubelet[2113]: I0209 19:02:24.309633 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ed2bbdef-7194-40c6-b258-69580eb9d772-data\") pod \"nfs-server-provisioner-0\" (UID: \"ed2bbdef-7194-40c6-b258-69580eb9d772\") " pod="default/nfs-server-provisioner-0" Feb 9 19:02:24.765808 env[1643]: time="2024-02-09T19:02:24.765760602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ed2bbdef-7194-40c6-b258-69580eb9d772,Namespace:default,Attempt:0,}" Feb 9 19:02:25.039315 (udev-worker)[3477]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:02:25.050418 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:02:25.050773 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 19:02:25.042830 systemd-networkd[1459]: cali60e51b789ff: Link UP Feb 9 19:02:25.051018 systemd-networkd[1459]: cali60e51b789ff: Gained carrier Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.834 [INFO][3484] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.121-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ed2bbdef-7194-40c6-b258-69580eb9d772 1002 0 2024-02-09 19:02:24 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.22.121 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.121-k8s-nfs--server--provisioner--0-" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.835 [INFO][3484] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.121-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.932 [INFO][3495] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" HandleID="k8s-pod-network.cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Workload="172.31.22.121-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.953 [INFO][3495] ipam_plugin.go 268: Auto assigning IP ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" HandleID="k8s-pod-network.cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Workload="172.31.22.121-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004a1bc0), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.121", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 19:02:24.932624301 +0000 UTC"}, Hostname:"172.31.22.121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.953 [INFO][3495] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.953 [INFO][3495] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.953 [INFO][3495] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.121' Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.957 [INFO][3495] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" host="172.31.22.121" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.965 [INFO][3495] ipam.go 372: Looking up existing affinities for host host="172.31.22.121" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.976 [INFO][3495] ipam.go 489: Trying affinity for 192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.982 [INFO][3495] ipam.go 155: Attempting to load block cidr=192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.987 [INFO][3495] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.988 [INFO][3495] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.116.192/26 handle="k8s-pod-network.cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" host="172.31.22.121" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:24.991 [INFO][3495] ipam.go 1682: Creating new handle: k8s-pod-network.cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470 Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:25.013 [INFO][3495] ipam.go 1203: Writing block in order to claim IPs block=192.168.116.192/26 handle="k8s-pod-network.cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" host="172.31.22.121" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:25.025 [INFO][3495] ipam.go 1216: Successfully claimed IPs: [192.168.116.195/26] block=192.168.116.192/26 handle="k8s-pod-network.cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" host="172.31.22.121" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:25.026 [INFO][3495] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.116.195/26] handle="k8s-pod-network.cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" host="172.31.22.121" Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:25.026 [INFO][3495] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:25.077369 env[1643]: 2024-02-09 19:02:25.026 [INFO][3495] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.116.195/26] IPv6=[] ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" HandleID="k8s-pod-network.cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Workload="172.31.22.121-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:02:25.080662 env[1643]: 2024-02-09 19:02:25.030 [INFO][3484] k8s.go 385: Populated endpoint ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.121-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ed2bbdef-7194-40c6-b258-69580eb9d772", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 2, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.116.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:25.080662 env[1643]: 2024-02-09 19:02:25.032 [INFO][3484] k8s.go 386: Calico CNI using IPs: [192.168.116.195/32] ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.121-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:02:25.080662 env[1643]: 2024-02-09 19:02:25.032 [INFO][3484] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.121-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:02:25.080662 env[1643]: 2024-02-09 19:02:25.056 [INFO][3484] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.121-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:02:25.080968 env[1643]: 2024-02-09 19:02:25.057 [INFO][3484] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.121-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ed2bbdef-7194-40c6-b258-69580eb9d772", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 2, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.116.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"b6:fe:cb:ee:6c:5e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:25.080968 env[1643]: 2024-02-09 19:02:25.073 [INFO][3484] k8s.go 491: Wrote updated endpoint to datastore ContainerID="cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.121-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:02:25.097928 kubelet[2113]: E0209 19:02:25.097629 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:25.124616 env[1643]: time="2024-02-09T19:02:25.124479248Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:02:25.124868 env[1643]: time="2024-02-09T19:02:25.124824720Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:02:25.124997 env[1643]: time="2024-02-09T19:02:25.124971471Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:02:25.125584 env[1643]: time="2024-02-09T19:02:25.125490266Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470 pid=3525 runtime=io.containerd.runc.v2 Feb 9 19:02:25.140357 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 9 19:02:25.140504 kernel: audit: type=1325 audit(1707505345.133:842): table=filter:75 family=2 entries=38 op=nft_register_chain pid=3530 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:25.133000 audit[3530]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=3530 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:25.133000 audit[3530]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffca45c4120 a2=0 a3=7ffca45c410c items=0 ppid=2742 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.152398 kernel: audit: type=1300 audit(1707505345.133:842): arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffca45c4120 a2=0 a3=7ffca45c410c items=0 ppid=2742 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.133000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:25.167084 kernel: audit: type=1327 audit(1707505345.133:842): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:25.182773 systemd[1]: Started cri-containerd-cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470.scope. Feb 9 19:02:25.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.215056 kernel: audit: type=1400 audit(1707505345.207:843): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.226805 kernel: audit: type=1400 audit(1707505345.207:844): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.226925 kernel: audit: type=1400 audit(1707505345.207:845): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.231356 kernel: audit: type=1400 audit(1707505345.207:846): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.231732 kernel: audit: type=1400 audit(1707505345.207:847): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.246988 kernel: audit: type=1400 audit(1707505345.207:848): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.247167 kernel: audit: type=1400 audit(1707505345.207:849): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.207000 audit: BPF prog-id=118 op=LOAD Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3525 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626363663338643635343530333830336639353866373761616666 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3525 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626363663338643635343530333830336639353866373761616666 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit: BPF prog-id=119 op=LOAD Feb 9 19:02:25.214000 audit[3537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b2a80 items=0 ppid=3525 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626363663338643635343530333830336639353866373761616666 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit: BPF prog-id=120 op=LOAD Feb 9 19:02:25.214000 audit[3537]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b2ac8 items=0 ppid=3525 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626363663338643635343530333830336639353866373761616666 Feb 9 19:02:25.214000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:02:25.214000 audit: BPF prog-id=119 op=UNLOAD Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { perfmon } for pid=3537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit[3537]: AVC avc: denied { bpf } for pid=3537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.214000 audit: BPF prog-id=121 op=LOAD Feb 9 19:02:25.214000 audit[3537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b2ed8 items=0 ppid=3525 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626363663338643635343530333830336639353866373761616666 Feb 9 19:02:25.280264 env[1643]: time="2024-02-09T19:02:25.280211103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ed2bbdef-7194-40c6-b258-69580eb9d772,Namespace:default,Attempt:0,} returns sandbox id \"cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470\"" Feb 9 19:02:25.282858 env[1643]: time="2024-02-09T19:02:25.282821706Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 19:02:26.099141 kubelet[2113]: E0209 19:02:26.099101 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:26.919648 systemd-networkd[1459]: cali60e51b789ff: Gained IPv6LL Feb 9 19:02:27.101205 kubelet[2113]: E0209 19:02:27.101135 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:28.102167 kubelet[2113]: E0209 19:02:28.102128 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:29.103354 kubelet[2113]: E0209 19:02:29.103281 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:29.334160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2505731677.mount: Deactivated successfully. Feb 9 19:02:30.104228 kubelet[2113]: E0209 19:02:30.104169 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:31.105172 kubelet[2113]: E0209 19:02:31.105113 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:32.105754 kubelet[2113]: E0209 19:02:32.105696 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:32.192881 env[1643]: time="2024-02-09T19:02:32.192823317Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:32.203342 env[1643]: time="2024-02-09T19:02:32.203288697Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:32.210419 env[1643]: time="2024-02-09T19:02:32.210371377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:32.219830 env[1643]: time="2024-02-09T19:02:32.219785594Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:32.220927 env[1643]: time="2024-02-09T19:02:32.220867015Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 19:02:32.227231 env[1643]: time="2024-02-09T19:02:32.227188783Z" level=info msg="CreateContainer within sandbox \"cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 19:02:32.288680 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3588227659.mount: Deactivated successfully. Feb 9 19:02:32.432348 env[1643]: time="2024-02-09T19:02:32.431642105Z" level=info msg="CreateContainer within sandbox \"cbbccf38d654503803f958f77aaff263a56b0570f1eb0d275785149ffd6b1470\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"62382d2d3394ab9bab134619dfdeb42108f6b979c8d167c41303b24960ad2f1b\"" Feb 9 19:02:32.432538 env[1643]: time="2024-02-09T19:02:32.432510654Z" level=info msg="StartContainer for \"62382d2d3394ab9bab134619dfdeb42108f6b979c8d167c41303b24960ad2f1b\"" Feb 9 19:02:32.497896 systemd[1]: Started cri-containerd-62382d2d3394ab9bab134619dfdeb42108f6b979c8d167c41303b24960ad2f1b.scope. Feb 9 19:02:32.532801 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 9 19:02:32.533011 kernel: audit: type=1400 audit(1707505352.521:861): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.533066 kernel: audit: type=1400 audit(1707505352.521:862): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.538103 kernel: audit: type=1400 audit(1707505352.521:863): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.547451 kernel: audit: type=1400 audit(1707505352.521:864): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.547564 kernel: audit: type=1400 audit(1707505352.521:865): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.552210 kernel: audit: type=1400 audit(1707505352.521:866): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.556836 kernel: audit: type=1400 audit(1707505352.521:867): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.556984 kernel: audit: type=1400 audit(1707505352.521:868): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.565628 kernel: audit: type=1400 audit(1707505352.521:869): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.527000 audit: BPF prog-id=122 op=LOAD Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.572065 kernel: audit: type=1400 audit(1707505352.527:870): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3525 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:32.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333832643264333339346162396261623133343631396466646562 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3525 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:32.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333832643264333339346162396261623133343631396466646562 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.532000 audit: BPF prog-id=123 op=LOAD Feb 9 19:02:32.532000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00033a940 items=0 ppid=3525 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:32.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333832643264333339346162396261623133343631396466646562 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit: BPF prog-id=124 op=LOAD Feb 9 19:02:32.537000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00033a988 items=0 ppid=3525 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:32.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333832643264333339346162396261623133343631396466646562 Feb 9 19:02:32.537000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:02:32.537000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:32.537000 audit: BPF prog-id=125 op=LOAD Feb 9 19:02:32.537000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00033ad98 items=0 ppid=3525 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:32.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333832643264333339346162396261623133343631396466646562 Feb 9 19:02:32.602089 env[1643]: time="2024-02-09T19:02:32.601995545Z" level=info msg="StartContainer for \"62382d2d3394ab9bab134619dfdeb42108f6b979c8d167c41303b24960ad2f1b\" returns successfully" Feb 9 19:02:32.663000 audit[3607]: AVC avc: denied { search } for pid=3607 comm="rpcbind" name="crypto" dev="proc" ino=23899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c478 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:02:32.663000 audit[3607]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f6faa1960c0 a2=0 a3=0 items=0 ppid=3589 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c478 key=(null) Feb 9 19:02:32.663000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 19:02:32.763000 audit[3612]: AVC avc: denied { search } for pid=3612 comm="dbus-daemon" name="crypto" dev="proc" ino=23899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c478 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:02:32.763000 audit[3612]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f8e4f5930c0 a2=0 a3=0 items=0 ppid=3589 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c478 key=(null) Feb 9 19:02:32.763000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:02:32.769000 audit[3613]: AVC avc: denied { watch } for pid=3613 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c478 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c123,c478 tclass=dir permissive=0 Feb 9 19:02:32.769000 audit[3613]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=559f68a11d30 a2=2c8 a3=7ffefa986c8c items=0 ppid=3589 pid=3613 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c478 key=(null) Feb 9 19:02:32.769000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:02:32.777000 audit[3614]: AVC avc: denied { read } for pid=3614 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23933 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c478 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 19:02:32.777000 audit[3614]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fc595c9d320 a1=80000 a2=d a3=7ffdafc41d90 items=0 ppid=3589 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c478 key=(null) Feb 9 19:02:32.777000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:02:32.778000 audit[3614]: AVC avc: denied { search } for pid=3614 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c478 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:02:32.778000 audit[3614]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc5951f10c0 a2=0 a3=0 items=0 ppid=3589 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c478 key=(null) Feb 9 19:02:32.778000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:02:33.105929 kubelet[2113]: E0209 19:02:33.105856 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:33.524493 kubelet[2113]: I0209 19:02:33.524164 2113 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.5849711539999998 podCreationTimestamp="2024-02-09 19:02:24 +0000 UTC" firstStartedPulling="2024-02-09 19:02:25.282074774 +0000 UTC m=+46.580538407" lastFinishedPulling="2024-02-09 19:02:32.221216006 +0000 UTC m=+53.519679615" observedRunningTime="2024-02-09 19:02:33.523517972 +0000 UTC m=+54.821981591" watchObservedRunningTime="2024-02-09 19:02:33.524112362 +0000 UTC m=+54.822575983" Feb 9 19:02:33.553000 audit[3619]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:33.553000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffeec8b4850 a2=0 a3=7ffeec8b483c items=0 ppid=2331 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:33.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:33.558000 audit[3619]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:33.558000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffeec8b4850 a2=0 a3=7ffeec8b483c items=0 ppid=2331 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:33.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:34.106808 kubelet[2113]: E0209 19:02:34.106756 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:35.107396 kubelet[2113]: E0209 19:02:35.107342 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:36.107516 kubelet[2113]: E0209 19:02:36.107455 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:37.107914 kubelet[2113]: E0209 19:02:37.107866 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:37.199928 systemd[1]: run-containerd-runc-k8s.io-58a7b1223cedb4b48791b060c7490282fe4c19b8ed5078810501f87e15b2333c-runc.gz8Jry.mount: Deactivated successfully. Feb 9 19:02:38.108189 kubelet[2113]: E0209 19:02:38.108149 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:39.051215 kubelet[2113]: E0209 19:02:39.051159 2113 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:39.066560 env[1643]: time="2024-02-09T19:02:39.066518627Z" level=info msg="StopPodSandbox for \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\"" Feb 9 19:02:39.109958 kubelet[2113]: E0209 19:02:39.109644 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:39.141567 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 19:02:39.141720 kernel: audit: type=1325 audit(1707505359.134:886): table=filter:78 family=2 entries=9 op=nft_register_rule pid=3667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:39.134000 audit[3667]: NETFILTER_CFG table=filter:78 family=2 entries=9 op=nft_register_rule pid=3667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:39.151429 kernel: audit: type=1300 audit(1707505359.134:886): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe40f47c10 a2=0 a3=7ffe40f47bfc items=0 ppid=2331 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:39.134000 audit[3667]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe40f47c10 a2=0 a3=7ffe40f47bfc items=0 ppid=2331 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:39.151747 kubelet[2113]: I0209 19:02:39.147137 2113 topology_manager.go:215] "Topology Admit Handler" podUID="ebfd7213-c936-4830-befa-36b6eb8cb383" podNamespace="calico-apiserver" podName="calico-apiserver-6cc7c57446-wkjz5" Feb 9 19:02:39.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:39.162315 kernel: audit: type=1327 audit(1707505359.134:886): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:39.153000 audit[3667]: NETFILTER_CFG table=nat:79 family=2 entries=44 op=nft_register_rule pid=3667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:39.170506 kernel: audit: type=1325 audit(1707505359.153:887): table=nat:79 family=2 entries=44 op=nft_register_rule pid=3667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:39.171355 kubelet[2113]: W0209 19:02:39.169009 2113 reflector.go:535] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.22.121" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node '172.31.22.121' and this object Feb 9 19:02:39.171355 kubelet[2113]: E0209 19:02:39.169089 2113 reflector.go:147] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.22.121" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node '172.31.22.121' and this object Feb 9 19:02:39.171355 kubelet[2113]: W0209 19:02:39.169180 2113 reflector.go:535] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:172.31.22.121" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node '172.31.22.121' and this object Feb 9 19:02:39.171355 kubelet[2113]: E0209 19:02:39.169194 2113 reflector.go:147] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:172.31.22.121" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node '172.31.22.121' and this object Feb 9 19:02:39.153000 audit[3667]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffe40f47c10 a2=0 a3=7ffe40f47bfc items=0 ppid=2331 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:39.175881 systemd[1]: Created slice kubepods-besteffort-podebfd7213_c936_4830_befa_36b6eb8cb383.slice. Feb 9 19:02:39.191061 kernel: audit: type=1300 audit(1707505359.153:887): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffe40f47c10 a2=0 a3=7ffe40f47bfc items=0 ppid=2331 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:39.153000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:39.197000 audit[3670]: NETFILTER_CFG table=filter:80 family=2 entries=10 op=nft_register_rule pid=3670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:39.208555 kernel: audit: type=1327 audit(1707505359.153:887): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:39.208703 kernel: audit: type=1325 audit(1707505359.197:888): table=filter:80 family=2 entries=10 op=nft_register_rule pid=3670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:39.197000 audit[3670]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff154f2140 a2=0 a3=7fff154f212c items=0 ppid=2331 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:39.216481 kernel: audit: type=1300 audit(1707505359.197:888): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff154f2140 a2=0 a3=7fff154f212c items=0 ppid=2331 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:39.216626 kernel: audit: type=1327 audit(1707505359.197:888): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:39.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:39.202000 audit[3670]: NETFILTER_CFG table=nat:81 family=2 entries=44 op=nft_register_rule pid=3670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:39.225422 kernel: audit: type=1325 audit(1707505359.202:889): table=nat:81 family=2 entries=44 op=nft_register_rule pid=3670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:39.202000 audit[3670]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fff154f2140 a2=0 a3=7fff154f212c items=0 ppid=2331 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:39.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:39.247804 kubelet[2113]: I0209 19:02:39.247769 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ebfd7213-c936-4830-befa-36b6eb8cb383-calico-apiserver-certs\") pod \"calico-apiserver-6cc7c57446-wkjz5\" (UID: \"ebfd7213-c936-4830-befa-36b6eb8cb383\") " pod="calico-apiserver/calico-apiserver-6cc7c57446-wkjz5" Feb 9 19:02:39.248168 kubelet[2113]: I0209 19:02:39.247829 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-knz7f\" (UniqueName: \"kubernetes.io/projected/ebfd7213-c936-4830-befa-36b6eb8cb383-kube-api-access-knz7f\") pod \"calico-apiserver-6cc7c57446-wkjz5\" (UID: \"ebfd7213-c936-4830-befa-36b6eb8cb383\") " pod="calico-apiserver/calico-apiserver-6cc7c57446-wkjz5" Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.305 [WARNING][3661] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-csi--node--driver--9kflt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc", Pod:"csi-node-driver-9kflt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7c591965e67", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.306 [INFO][3661] k8s.go 578: Cleaning up netns ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.306 [INFO][3661] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" iface="eth0" netns="" Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.306 [INFO][3661] k8s.go 585: Releasing IP address(es) ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.306 [INFO][3661] utils.go 188: Calico CNI releasing IP address ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.335 [INFO][3674] ipam_plugin.go 415: Releasing address using handleID ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" HandleID="k8s-pod-network.46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.337 [INFO][3674] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.337 [INFO][3674] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.371 [WARNING][3674] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" HandleID="k8s-pod-network.46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.371 [INFO][3674] ipam_plugin.go 443: Releasing address using workloadID ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" HandleID="k8s-pod-network.46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.383 [INFO][3674] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:39.386154 env[1643]: 2024-02-09 19:02:39.384 [INFO][3661] k8s.go 591: Teardown processing complete. ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:39.388254 env[1643]: time="2024-02-09T19:02:39.386196039Z" level=info msg="TearDown network for sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\" successfully" Feb 9 19:02:39.388254 env[1643]: time="2024-02-09T19:02:39.386233275Z" level=info msg="StopPodSandbox for \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\" returns successfully" Feb 9 19:02:39.388395 env[1643]: time="2024-02-09T19:02:39.388360077Z" level=info msg="RemovePodSandbox for \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\"" Feb 9 19:02:39.388581 env[1643]: time="2024-02-09T19:02:39.388513626Z" level=info msg="Forcibly stopping sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\"" Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.437 [WARNING][3692] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-csi--node--driver--9kflt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bcda9d49-c3b9-4076-bd5b-bd9baea5b98e", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"7ebb64a229fcae1c56f57b9678a5fbcf3ef7d6305b6b2b3e2b2b85a2d21bfedc", Pod:"csi-node-driver-9kflt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7c591965e67", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.438 [INFO][3692] k8s.go 578: Cleaning up netns ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.438 [INFO][3692] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" iface="eth0" netns="" Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.438 [INFO][3692] k8s.go 585: Releasing IP address(es) ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.438 [INFO][3692] utils.go 188: Calico CNI releasing IP address ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.469 [INFO][3699] ipam_plugin.go 415: Releasing address using handleID ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" HandleID="k8s-pod-network.46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.470 [INFO][3699] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.470 [INFO][3699] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.483 [WARNING][3699] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" HandleID="k8s-pod-network.46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.483 [INFO][3699] ipam_plugin.go 443: Releasing address using workloadID ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" HandleID="k8s-pod-network.46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Workload="172.31.22.121-k8s-csi--node--driver--9kflt-eth0" Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.487 [INFO][3699] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:39.491402 env[1643]: 2024-02-09 19:02:39.488 [INFO][3692] k8s.go 591: Teardown processing complete. ContainerID="46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda" Feb 9 19:02:39.492436 env[1643]: time="2024-02-09T19:02:39.491438793Z" level=info msg="TearDown network for sandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\" successfully" Feb 9 19:02:39.503620 env[1643]: time="2024-02-09T19:02:39.503571067Z" level=info msg="RemovePodSandbox \"46e89091ab72875905979f651f2a6de90a2627bfb15178ae6a51a443e26dabda\" returns successfully" Feb 9 19:02:39.506859 env[1643]: time="2024-02-09T19:02:39.506244037Z" level=info msg="StopPodSandbox for \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\"" Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.580 [WARNING][3719] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"3df298b3-eb90-43bd-b690-f97b2f1a930f", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9", Pod:"nginx-deployment-6d5f899847-b6zkt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic010e87561d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.580 [INFO][3719] k8s.go 578: Cleaning up netns ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.580 [INFO][3719] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" iface="eth0" netns="" Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.580 [INFO][3719] k8s.go 585: Releasing IP address(es) ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.580 [INFO][3719] utils.go 188: Calico CNI releasing IP address ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.614 [INFO][3726] ipam_plugin.go 415: Releasing address using handleID ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" HandleID="k8s-pod-network.133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.614 [INFO][3726] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.614 [INFO][3726] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.624 [WARNING][3726] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" HandleID="k8s-pod-network.133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.624 [INFO][3726] ipam_plugin.go 443: Releasing address using workloadID ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" HandleID="k8s-pod-network.133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.627 [INFO][3726] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:39.630559 env[1643]: 2024-02-09 19:02:39.629 [INFO][3719] k8s.go 591: Teardown processing complete. ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:39.630559 env[1643]: time="2024-02-09T19:02:39.630563554Z" level=info msg="TearDown network for sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\" successfully" Feb 9 19:02:39.630559 env[1643]: time="2024-02-09T19:02:39.630599740Z" level=info msg="StopPodSandbox for \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\" returns successfully" Feb 9 19:02:39.631594 env[1643]: time="2024-02-09T19:02:39.631148035Z" level=info msg="RemovePodSandbox for \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\"" Feb 9 19:02:39.631594 env[1643]: time="2024-02-09T19:02:39.631189411Z" level=info msg="Forcibly stopping sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\"" Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.682 [WARNING][3745] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"3df298b3-eb90-43bd-b690-f97b2f1a930f", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"e62348085d6e8497ba74a551c7801b96655ab3b30a9096eb37b677dc2ade66c9", Pod:"nginx-deployment-6d5f899847-b6zkt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic010e87561d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.682 [INFO][3745] k8s.go 578: Cleaning up netns ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.682 [INFO][3745] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" iface="eth0" netns="" Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.682 [INFO][3745] k8s.go 585: Releasing IP address(es) ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.682 [INFO][3745] utils.go 188: Calico CNI releasing IP address ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.719 [INFO][3752] ipam_plugin.go 415: Releasing address using handleID ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" HandleID="k8s-pod-network.133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.719 [INFO][3752] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.720 [INFO][3752] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.728 [WARNING][3752] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" HandleID="k8s-pod-network.133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.728 [INFO][3752] ipam_plugin.go 443: Releasing address using workloadID ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" HandleID="k8s-pod-network.133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Workload="172.31.22.121-k8s-nginx--deployment--6d5f899847--b6zkt-eth0" Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.735 [INFO][3752] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:39.748784 env[1643]: 2024-02-09 19:02:39.738 [INFO][3745] k8s.go 591: Teardown processing complete. ContainerID="133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13" Feb 9 19:02:39.748784 env[1643]: time="2024-02-09T19:02:39.742947887Z" level=info msg="TearDown network for sandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\" successfully" Feb 9 19:02:39.755295 env[1643]: time="2024-02-09T19:02:39.755209515Z" level=info msg="RemovePodSandbox \"133ffe9a1fc44f591e44bec1423482cb58d4e250a15ec39752123ff363ba3d13\" returns successfully" Feb 9 19:02:40.110433 kubelet[2113]: E0209 19:02:40.110379 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:40.350070 kubelet[2113]: E0209 19:02:40.350014 2113 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Feb 9 19:02:40.350236 kubelet[2113]: E0209 19:02:40.350147 2113 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ebfd7213-c936-4830-befa-36b6eb8cb383-calico-apiserver-certs podName:ebfd7213-c936-4830-befa-36b6eb8cb383 nodeName:}" failed. No retries permitted until 2024-02-09 19:02:40.850119324 +0000 UTC m=+62.148582936 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/ebfd7213-c936-4830-befa-36b6eb8cb383-calico-apiserver-certs") pod "calico-apiserver-6cc7c57446-wkjz5" (UID: "ebfd7213-c936-4830-befa-36b6eb8cb383") : failed to sync secret cache: timed out waiting for the condition Feb 9 19:02:40.368332 kubelet[2113]: E0209 19:02:40.368209 2113 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:02:40.368332 kubelet[2113]: E0209 19:02:40.368256 2113 projected.go:198] Error preparing data for projected volume kube-api-access-knz7f for pod calico-apiserver/calico-apiserver-6cc7c57446-wkjz5: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:02:40.368643 kubelet[2113]: E0209 19:02:40.368626 2113 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/ebfd7213-c936-4830-befa-36b6eb8cb383-kube-api-access-knz7f podName:ebfd7213-c936-4830-befa-36b6eb8cb383 nodeName:}" failed. No retries permitted until 2024-02-09 19:02:40.868583118 +0000 UTC m=+62.167046730 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-knz7f" (UniqueName: "kubernetes.io/projected/ebfd7213-c936-4830-befa-36b6eb8cb383-kube-api-access-knz7f") pod "calico-apiserver-6cc7c57446-wkjz5" (UID: "ebfd7213-c936-4830-befa-36b6eb8cb383") : failed to sync configmap cache: timed out waiting for the condition Feb 9 19:02:40.998506 env[1643]: time="2024-02-09T19:02:40.998453036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6cc7c57446-wkjz5,Uid:ebfd7213-c936-4830-befa-36b6eb8cb383,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:02:41.111192 kubelet[2113]: E0209 19:02:41.111128 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:41.172344 systemd-networkd[1459]: cali7e3beb4f590: Link UP Feb 9 19:02:41.178615 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:02:41.178725 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7e3beb4f590: link becomes ready Feb 9 19:02:41.178231 systemd-networkd[1459]: cali7e3beb4f590: Gained carrier Feb 9 19:02:41.178373 (udev-worker)[3778]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.067 [INFO][3760] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0 calico-apiserver-6cc7c57446- calico-apiserver ebfd7213-c936-4830-befa-36b6eb8cb383 1094 0 2024-02-09 19:02:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6cc7c57446 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.22.121 calico-apiserver-6cc7c57446-wkjz5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7e3beb4f590 [] []}} ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Namespace="calico-apiserver" Pod="calico-apiserver-6cc7c57446-wkjz5" WorkloadEndpoint="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.067 [INFO][3760] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Namespace="calico-apiserver" Pod="calico-apiserver-6cc7c57446-wkjz5" WorkloadEndpoint="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.097 [INFO][3772] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" HandleID="k8s-pod-network.5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Workload="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.118 [INFO][3772] ipam_plugin.go 268: Auto assigning IP ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" HandleID="k8s-pod-network.5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Workload="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cab0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.22.121", "pod":"calico-apiserver-6cc7c57446-wkjz5", "timestamp":"2024-02-09 19:02:41.097846462 +0000 UTC"}, Hostname:"172.31.22.121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.119 [INFO][3772] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.119 [INFO][3772] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.119 [INFO][3772] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.121' Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.123 [INFO][3772] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" host="172.31.22.121" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.132 [INFO][3772] ipam.go 372: Looking up existing affinities for host host="172.31.22.121" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.140 [INFO][3772] ipam.go 489: Trying affinity for 192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.143 [INFO][3772] ipam.go 155: Attempting to load block cidr=192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.147 [INFO][3772] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.147 [INFO][3772] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.116.192/26 handle="k8s-pod-network.5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" host="172.31.22.121" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.152 [INFO][3772] ipam.go 1682: Creating new handle: k8s-pod-network.5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.156 [INFO][3772] ipam.go 1203: Writing block in order to claim IPs block=192.168.116.192/26 handle="k8s-pod-network.5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" host="172.31.22.121" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.162 [INFO][3772] ipam.go 1216: Successfully claimed IPs: [192.168.116.196/26] block=192.168.116.192/26 handle="k8s-pod-network.5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" host="172.31.22.121" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.162 [INFO][3772] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.116.196/26] handle="k8s-pod-network.5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" host="172.31.22.121" Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.162 [INFO][3772] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:41.193187 env[1643]: 2024-02-09 19:02:41.162 [INFO][3772] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.116.196/26] IPv6=[] ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" HandleID="k8s-pod-network.5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Workload="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0" Feb 9 19:02:41.194358 env[1643]: 2024-02-09 19:02:41.167 [INFO][3760] k8s.go 385: Populated endpoint ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Namespace="calico-apiserver" Pod="calico-apiserver-6cc7c57446-wkjz5" WorkloadEndpoint="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0", GenerateName:"calico-apiserver-6cc7c57446-", Namespace:"calico-apiserver", SelfLink:"", UID:"ebfd7213-c936-4830-befa-36b6eb8cb383", ResourceVersion:"1094", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 2, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6cc7c57446", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"", Pod:"calico-apiserver-6cc7c57446-wkjz5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.116.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7e3beb4f590", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:41.194358 env[1643]: 2024-02-09 19:02:41.167 [INFO][3760] k8s.go 386: Calico CNI using IPs: [192.168.116.196/32] ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Namespace="calico-apiserver" Pod="calico-apiserver-6cc7c57446-wkjz5" WorkloadEndpoint="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0" Feb 9 19:02:41.194358 env[1643]: 2024-02-09 19:02:41.167 [INFO][3760] dataplane_linux.go 68: Setting the host side veth name to cali7e3beb4f590 ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Namespace="calico-apiserver" Pod="calico-apiserver-6cc7c57446-wkjz5" WorkloadEndpoint="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0" Feb 9 19:02:41.194358 env[1643]: 2024-02-09 19:02:41.179 [INFO][3760] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Namespace="calico-apiserver" Pod="calico-apiserver-6cc7c57446-wkjz5" WorkloadEndpoint="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0" Feb 9 19:02:41.194358 env[1643]: 2024-02-09 19:02:41.180 [INFO][3760] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Namespace="calico-apiserver" Pod="calico-apiserver-6cc7c57446-wkjz5" WorkloadEndpoint="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0", GenerateName:"calico-apiserver-6cc7c57446-", Namespace:"calico-apiserver", SelfLink:"", UID:"ebfd7213-c936-4830-befa-36b6eb8cb383", ResourceVersion:"1094", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 2, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6cc7c57446", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc", Pod:"calico-apiserver-6cc7c57446-wkjz5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.116.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7e3beb4f590", MAC:"62:49:24:54:d6:89", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:41.194358 env[1643]: 2024-02-09 19:02:41.190 [INFO][3760] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc" Namespace="calico-apiserver" Pod="calico-apiserver-6cc7c57446-wkjz5" WorkloadEndpoint="172.31.22.121-k8s-calico--apiserver--6cc7c57446--wkjz5-eth0" Feb 9 19:02:41.232722 env[1643]: time="2024-02-09T19:02:41.232417725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:02:41.232722 env[1643]: time="2024-02-09T19:02:41.232474544Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:02:41.232722 env[1643]: time="2024-02-09T19:02:41.232493204Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:02:41.251213 env[1643]: time="2024-02-09T19:02:41.233788021Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc pid=3804 runtime=io.containerd.runc.v2 Feb 9 19:02:41.261000 audit[3822]: NETFILTER_CFG table=filter:82 family=2 entries=61 op=nft_register_chain pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:41.261000 audit[3822]: SYSCALL arch=c000003e syscall=46 success=yes exit=30956 a0=3 a1=7ffc1632aac0 a2=0 a3=7ffc1632aaac items=0 ppid=2742 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:41.261000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:41.267928 systemd[1]: Started cri-containerd-5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc.scope. Feb 9 19:02:41.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.297000 audit: BPF prog-id=126 op=LOAD Feb 9 19:02:41.298000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.298000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3804 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:41.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564373935343338613562646463623136316263306533613431663665 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3804 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:41.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564373935343338613562646463623136316263306533613431663665 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.299000 audit: BPF prog-id=127 op=LOAD Feb 9 19:02:41.299000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000391250 items=0 ppid=3804 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:41.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564373935343338613562646463623136316263306533613431663665 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit: BPF prog-id=128 op=LOAD Feb 9 19:02:41.300000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000391298 items=0 ppid=3804 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:41.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564373935343338613562646463623136316263306533613431663665 Feb 9 19:02:41.300000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:02:41.300000 audit: BPF prog-id=127 op=UNLOAD Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:41.300000 audit: BPF prog-id=129 op=LOAD Feb 9 19:02:41.300000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003916a8 items=0 ppid=3804 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:41.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564373935343338613562646463623136316263306533613431663665 Feb 9 19:02:41.352604 env[1643]: time="2024-02-09T19:02:41.352544768Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6cc7c57446-wkjz5,Uid:ebfd7213-c936-4830-befa-36b6eb8cb383,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc\"" Feb 9 19:02:41.355175 env[1643]: time="2024-02-09T19:02:41.355123050Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:02:41.873902 systemd[1]: run-containerd-runc-k8s.io-5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc-runc.bbfKAQ.mount: Deactivated successfully. Feb 9 19:02:42.112217 kubelet[2113]: E0209 19:02:42.112172 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:42.919474 systemd-networkd[1459]: cali7e3beb4f590: Gained IPv6LL Feb 9 19:02:43.112909 kubelet[2113]: E0209 19:02:43.112871 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:44.113610 kubelet[2113]: E0209 19:02:44.113554 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:45.114249 kubelet[2113]: E0209 19:02:45.114165 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:45.996457 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 19:02:45.996705 kernel: audit: type=1325 audit(1707505365.986:909): table=filter:83 family=2 entries=10 op=nft_register_rule pid=3868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:45.986000 audit[3868]: NETFILTER_CFG table=filter:83 family=2 entries=10 op=nft_register_rule pid=3868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:45.986000 audit[3868]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffecf8c35d0 a2=0 a3=7ffecf8c35bc items=0 ppid=2331 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:46.014568 kernel: audit: type=1300 audit(1707505365.986:909): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffecf8c35d0 a2=0 a3=7ffecf8c35bc items=0 ppid=2331 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:45.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:46.034059 kernel: audit: type=1327 audit(1707505365.986:909): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:46.023000 audit[3868]: NETFILTER_CFG table=nat:84 family=2 entries=44 op=nft_register_rule pid=3868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:46.023000 audit[3868]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffecf8c35d0 a2=0 a3=7ffecf8c35bc items=0 ppid=2331 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:46.049864 kernel: audit: type=1325 audit(1707505366.023:910): table=nat:84 family=2 entries=44 op=nft_register_rule pid=3868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:46.050007 kernel: audit: type=1300 audit(1707505366.023:910): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffecf8c35d0 a2=0 a3=7ffecf8c35bc items=0 ppid=2331 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:46.023000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:46.055189 kernel: audit: type=1327 audit(1707505366.023:910): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:46.114395 kubelet[2113]: E0209 19:02:46.114333 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:46.223664 env[1643]: time="2024-02-09T19:02:46.223532790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:46.227394 env[1643]: time="2024-02-09T19:02:46.227324863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:46.235673 env[1643]: time="2024-02-09T19:02:46.235621636Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:46.238212 env[1643]: time="2024-02-09T19:02:46.238171306Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:46.238778 env[1643]: time="2024-02-09T19:02:46.238728852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:02:46.241591 env[1643]: time="2024-02-09T19:02:46.241554356Z" level=info msg="CreateContainer within sandbox \"5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:02:46.264545 env[1643]: time="2024-02-09T19:02:46.264355553Z" level=info msg="CreateContainer within sandbox \"5d795438a5bddcb161bc0e3a41f6ee3a74b3c76223d5020caf796163243d58cc\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c2c9b21d76dec4ffc77e13ac872942c9bb8eafce147c9980688ea37905df909c\"" Feb 9 19:02:46.265899 env[1643]: time="2024-02-09T19:02:46.265847943Z" level=info msg="StartContainer for \"c2c9b21d76dec4ffc77e13ac872942c9bb8eafce147c9980688ea37905df909c\"" Feb 9 19:02:46.319873 systemd[1]: Started cri-containerd-c2c9b21d76dec4ffc77e13ac872942c9bb8eafce147c9980688ea37905df909c.scope. Feb 9 19:02:46.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.365667 kernel: audit: type=1400 audit(1707505366.350:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.365849 kernel: audit: type=1400 audit(1707505366.350:912): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.365882 kernel: audit: type=1400 audit(1707505366.350:913): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.376370 kernel: audit: type=1400 audit(1707505366.350:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.350000 audit: BPF prog-id=130 op=LOAD Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3804 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:46.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332633962323164373664656334666663373765313361633837323934 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3804 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:46.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332633962323164373664656334666663373765313361633837323934 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.357000 audit: BPF prog-id=131 op=LOAD Feb 9 19:02:46.357000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a9bd0 items=0 ppid=3804 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:46.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332633962323164373664656334666663373765313361633837323934 Feb 9 19:02:46.369000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.369000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.369000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.369000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.369000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.369000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.369000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.369000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.369000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.369000 audit: BPF prog-id=132 op=LOAD Feb 9 19:02:46.369000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a9c18 items=0 ppid=3804 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:46.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332633962323164373664656334666663373765313361633837323934 Feb 9 19:02:46.377000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:02:46.377000 audit: BPF prog-id=131 op=UNLOAD Feb 9 19:02:46.377000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.377000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.377000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.377000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.377000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.377000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.377000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.377000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.377000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.377000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:46.377000 audit: BPF prog-id=133 op=LOAD Feb 9 19:02:46.377000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001c4028 items=0 ppid=3804 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:46.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332633962323164373664656334666663373765313361633837323934 Feb 9 19:02:46.430098 env[1643]: time="2024-02-09T19:02:46.430017279Z" level=info msg="StartContainer for \"c2c9b21d76dec4ffc77e13ac872942c9bb8eafce147c9980688ea37905df909c\" returns successfully" Feb 9 19:02:46.579146 kubelet[2113]: I0209 19:02:46.576642 2113 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6cc7c57446-wkjz5" podStartSLOduration=2.691694773 podCreationTimestamp="2024-02-09 19:02:39 +0000 UTC" firstStartedPulling="2024-02-09 19:02:41.354524706 +0000 UTC m=+62.652988306" lastFinishedPulling="2024-02-09 19:02:46.239425185 +0000 UTC m=+67.537888791" observedRunningTime="2024-02-09 19:02:46.575971312 +0000 UTC m=+67.874434927" watchObservedRunningTime="2024-02-09 19:02:46.576595258 +0000 UTC m=+67.875058872" Feb 9 19:02:46.608000 audit[3912]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:46.608000 audit[3912]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff53043bd0 a2=0 a3=7fff53043bbc items=0 ppid=2331 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:46.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:46.612000 audit[3912]: NETFILTER_CFG table=nat:86 family=2 entries=44 op=nft_register_rule pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:02:46.612000 audit[3912]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fff53043bd0 a2=0 a3=7fff53043bbc items=0 ppid=2331 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:46.612000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:02:47.115233 kubelet[2113]: E0209 19:02:47.115195 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:47.178000 audit[3891]: AVC avc: denied { watch } for pid=3891 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_02_40.3294744450/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c853,c982 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c853,c982 tclass=file permissive=0 Feb 9 19:02:47.178000 audit[3891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b6cee0 a2=fc6 a3=0 items=0 ppid=3804 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c853,c982 key=(null) Feb 9 19:02:47.178000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:02:48.117294 kubelet[2113]: E0209 19:02:48.117239 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:49.118348 kubelet[2113]: E0209 19:02:49.118297 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:50.119244 kubelet[2113]: E0209 19:02:50.119195 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:51.120182 kubelet[2113]: E0209 19:02:51.120132 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:52.120687 kubelet[2113]: E0209 19:02:52.120588 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:53.121739 kubelet[2113]: E0209 19:02:53.121699 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:54.122483 kubelet[2113]: E0209 19:02:54.122433 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:55.122880 kubelet[2113]: E0209 19:02:55.122828 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:56.123533 kubelet[2113]: E0209 19:02:56.123477 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:57.124306 kubelet[2113]: E0209 19:02:57.124253 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:57.273799 kubelet[2113]: I0209 19:02:57.273752 2113 topology_manager.go:215] "Topology Admit Handler" podUID="8bf73844-c936-4174-b3c1-43850f4358a3" podNamespace="default" podName="test-pod-1" Feb 9 19:02:57.280735 systemd[1]: Created slice kubepods-besteffort-pod8bf73844_c936_4174_b3c1_43850f4358a3.slice. Feb 9 19:02:57.312874 kubelet[2113]: I0209 19:02:57.312813 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dgskx\" (UniqueName: \"kubernetes.io/projected/8bf73844-c936-4174-b3c1-43850f4358a3-kube-api-access-dgskx\") pod \"test-pod-1\" (UID: \"8bf73844-c936-4174-b3c1-43850f4358a3\") " pod="default/test-pod-1" Feb 9 19:02:57.313270 kubelet[2113]: I0209 19:02:57.313111 2113 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-8836f3c1-5af8-457c-8988-f4967464e711\" (UniqueName: \"kubernetes.io/nfs/8bf73844-c936-4174-b3c1-43850f4358a3-pvc-8836f3c1-5af8-457c-8988-f4967464e711\") pod \"test-pod-1\" (UID: \"8bf73844-c936-4174-b3c1-43850f4358a3\") " pod="default/test-pod-1" Feb 9 19:02:57.466704 kernel: Failed to create system directory netfs Feb 9 19:02:57.467226 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 19:02:57.467455 kernel: audit: type=1400 audit(1707505377.453:932): avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.467554 kernel: Failed to create system directory netfs Feb 9 19:02:57.467595 kernel: Failed to create system directory netfs Feb 9 19:02:57.467625 kernel: audit: type=1400 audit(1707505377.453:932): avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.467654 kernel: Failed to create system directory netfs Feb 9 19:02:57.453000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.453000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.486536 kernel: audit: type=1400 audit(1707505377.453:932): avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.453000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.494966 kernel: audit: type=1400 audit(1707505377.453:932): avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.453000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.453000 audit[3927]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5616094525e0 a1=153bc a2=561607de42b0 a3=5 items=0 ppid=50 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:57.506149 kernel: audit: type=1300 audit(1707505377.453:932): arch=c000003e syscall=175 success=yes exit=0 a0=5616094525e0 a1=153bc a2=561607de42b0 a3=5 items=0 ppid=50 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:57.453000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:02:57.509102 kernel: audit: type=1327 audit(1707505377.453:932): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:02:57.509145 kernel: Failed to create system directory fscache Feb 9 19:02:57.515832 kernel: audit: type=1400 audit(1707505377.502:933): avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.516026 kernel: Failed to create system directory fscache Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.522116 kernel: audit: type=1400 audit(1707505377.502:933): avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.522366 kernel: Failed to create system directory fscache Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.528205 kernel: audit: type=1400 audit(1707505377.502:933): avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.528322 kernel: Failed to create system directory fscache Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.535383 kernel: audit: type=1400 audit(1707505377.502:933): avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.535520 kernel: Failed to create system directory fscache Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.538934 kernel: Failed to create system directory fscache Feb 9 19:02:57.539194 kernel: Failed to create system directory fscache Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.541995 kernel: Failed to create system directory fscache Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.544464 kernel: Failed to create system directory fscache Feb 9 19:02:57.544521 kernel: Failed to create system directory fscache Feb 9 19:02:57.544566 kernel: Failed to create system directory fscache Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.546987 kernel: Failed to create system directory fscache Feb 9 19:02:57.547064 kernel: Failed to create system directory fscache Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.502000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.549306 kernel: Failed to create system directory fscache Feb 9 19:02:57.502000 audit[3927]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5616096679c0 a1=4c0fc a2=561607de42b0 a3=5 items=0 ppid=50 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:57.502000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:02:57.552236 kernel: FS-Cache: Loaded Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.598871 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.602727 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.602795 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.602845 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.602876 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.605442 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.605534 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.607608 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.607681 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.610497 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.610581 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.612923 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.613108 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.615638 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.615725 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.618881 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.618947 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.626235 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.626343 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.633669 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.633779 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.633810 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.642143 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.642263 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.644414 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.644519 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.647437 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.647523 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.650071 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.650215 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.652809 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.652886 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.654138 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.656470 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.656618 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.658862 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.658923 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.662215 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.662306 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.664563 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.664697 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.667058 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.668274 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.668329 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.670512 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.670572 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.671782 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.674334 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.674394 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.676619 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.676674 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.679163 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.679219 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.682024 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.682163 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.684263 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.684816 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.688395 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.690631 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.690707 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.694825 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.694940 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.697229 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.697320 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.700301 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.700383 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.703007 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.703101 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.706184 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.709501 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.709589 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.712049 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.712103 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.715155 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.715215 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.718618 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.718695 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.723772 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.723930 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.723964 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.723994 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.724311 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.726955 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.727432 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.730167 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.730245 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.732280 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.732321 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.734975 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.735049 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.737445 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.737515 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.740560 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.740632 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.743471 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.743549 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.746163 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.746306 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.748498 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.748565 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.753203 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.753290 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.755973 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.756116 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.759125 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.759198 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.761472 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.761650 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.764268 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.764442 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.767012 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.767317 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.775824 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.775953 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.778408 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.778497 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.782001 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.782189 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.784636 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.784940 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.787359 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.787442 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.788506 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.793663 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.793802 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.575000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.801176 kernel: Failed to create system directory sunrpc Feb 9 19:02:57.820596 kernel: RPC: Registered named UNIX socket transport module. Feb 9 19:02:57.820727 kernel: RPC: Registered udp transport module. Feb 9 19:02:57.820761 kernel: RPC: Registered tcp transport module. Feb 9 19:02:57.820786 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 19:02:57.575000 audit[3927]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5616096b3ad0 a1=1588c4 a2=561607de42b0 a3=5 items=6 ppid=50 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:57.575000 audit: CWD cwd="/" Feb 9 19:02:57.575000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:57.575000 audit: PATH item=1 name=(null) inode=25653 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:57.575000 audit: PATH item=2 name=(null) inode=25653 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:57.575000 audit: PATH item=3 name=(null) inode=25654 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:57.575000 audit: PATH item=4 name=(null) inode=25653 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:57.575000 audit: PATH item=5 name=(null) inode=25655 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:57.575000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.859426 kernel: Failed to create system directory nfs Feb 9 19:02:57.859516 kernel: Failed to create system directory nfs Feb 9 19:02:57.859546 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.861373 kernel: Failed to create system directory nfs Feb 9 19:02:57.861449 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.864916 kernel: Failed to create system directory nfs Feb 9 19:02:57.865017 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.867239 kernel: Failed to create system directory nfs Feb 9 19:02:57.867304 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.875181 kernel: Failed to create system directory nfs Feb 9 19:02:57.875295 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.877816 kernel: Failed to create system directory nfs Feb 9 19:02:57.877895 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.880823 kernel: Failed to create system directory nfs Feb 9 19:02:57.880889 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.882154 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.885106 kernel: Failed to create system directory nfs Feb 9 19:02:57.885226 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.887129 kernel: Failed to create system directory nfs Feb 9 19:02:57.887191 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.888096 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.890027 kernel: Failed to create system directory nfs Feb 9 19:02:57.890073 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.892023 kernel: Failed to create system directory nfs Feb 9 19:02:57.892093 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.893963 kernel: Failed to create system directory nfs Feb 9 19:02:57.894450 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.895980 kernel: Failed to create system directory nfs Feb 9 19:02:57.896868 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.898836 kernel: Failed to create system directory nfs Feb 9 19:02:57.898919 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.901093 kernel: Failed to create system directory nfs Feb 9 19:02:57.901161 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.903177 kernel: Failed to create system directory nfs Feb 9 19:02:57.903218 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.905127 kernel: Failed to create system directory nfs Feb 9 19:02:57.905181 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.907259 kernel: Failed to create system directory nfs Feb 9 19:02:57.907335 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.909323 kernel: Failed to create system directory nfs Feb 9 19:02:57.909362 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.911661 kernel: Failed to create system directory nfs Feb 9 19:02:57.911738 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.913661 kernel: Failed to create system directory nfs Feb 9 19:02:57.913697 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.916229 kernel: Failed to create system directory nfs Feb 9 19:02:57.916280 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.918495 kernel: Failed to create system directory nfs Feb 9 19:02:57.918540 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.920956 kernel: Failed to create system directory nfs Feb 9 19:02:57.921021 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.922057 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.922956 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.923978 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.925104 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.927331 kernel: Failed to create system directory nfs Feb 9 19:02:57.927370 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.929461 kernel: Failed to create system directory nfs Feb 9 19:02:57.929503 kernel: Failed to create system directory nfs Feb 9 19:02:57.847000 audit[3927]: AVC avc: denied { confidentiality } for pid=3927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.847000 audit[3927]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561609856680 a1=e29dc a2=561607de42b0 a3=5 items=0 ppid=50 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:57.847000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:02:57.945154 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.003628 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.003749 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.003778 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.003824 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.003849 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.005133 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.007095 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.007179 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.009782 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.009856 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.012018 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.012105 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.013978 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.014053 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.016385 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.016474 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.018410 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.018457 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.020668 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.020740 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.022702 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.022853 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.025012 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.025360 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.027652 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.027700 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.029635 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.029805 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.031724 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.031803 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.034160 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.034224 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.036202 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.036261 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.038272 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.038325 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.040263 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.040314 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.042761 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.042840 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.045292 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.045357 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.047328 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.047382 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.049326 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.049380 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.051392 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.051518 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.053666 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.053727 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.055710 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.055763 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.057872 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.057927 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.060183 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.060221 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.062143 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.062196 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.064342 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.064411 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.066543 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.066592 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.067641 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.070116 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.070190 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.072445 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.072504 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.074511 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.074566 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.076640 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.076699 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.078752 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.078802 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.080818 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.080879 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.083485 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.083555 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.086647 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.086751 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.089672 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.089747 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.090891 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.092969 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.093007 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.095008 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.095081 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.096985 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.097029 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.099261 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.099341 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.101362 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.101418 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.103366 kernel: Failed to create system directory nfs4 Feb 9 19:02:58.103405 kernel: Failed to create system directory nfs4 Feb 9 19:02:57.980000 audit[3932]: AVC avc: denied { confidentiality } for pid=3932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.125000 kubelet[2113]: E0209 19:02:58.124938 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:58.281526 kernel: NFS: Registering the id_resolver key type Feb 9 19:02:58.281661 kernel: Key type id_resolver registered Feb 9 19:02:58.281713 kernel: Key type id_legacy registered Feb 9 19:02:57.980000 audit[3932]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fce3addb010 a1=1d3cc4 a2=55cba32cf2b0 a3=5 items=0 ppid=50 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:57.980000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.299908 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.299964 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.300012 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.302991 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.303251 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.305875 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.306929 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.308992 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.309099 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.311545 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.311700 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.313636 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.313695 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.315981 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.316067 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.318109 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.318174 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.319103 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.320209 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.322250 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.322289 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.323580 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.325659 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.325699 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.327708 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.327744 kernel: Failed to create system directory rpcgss Feb 9 19:02:58.293000 audit[3933]: AVC avc: denied { confidentiality } for pid=3933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:58.293000 audit[3933]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5bea1b7010 a1=4f524 a2=555ca40cb2b0 a3=5 items=0 ppid=50 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:58.293000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 19:02:58.354977 nfsidmap[3940]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Feb 9 19:02:58.359629 nfsidmap[3941]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Feb 9 19:02:58.378000 audit[1843]: AVC avc: denied { watch_reads } for pid=1843 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:58.378000 audit[1843]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d0d682dd70 a2=10 a3=608364cbba8db73d items=0 ppid=1 pid=1843 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:58.378000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:02:58.378000 audit[1843]: AVC avc: denied { watch_reads } for pid=1843 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:58.378000 audit[1843]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d0d682dd70 a2=10 a3=608364cbba8db73d items=0 ppid=1 pid=1843 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:58.378000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:02:58.378000 audit[1843]: AVC avc: denied { watch_reads } for pid=1843 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:58.378000 audit[1843]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d0d682dd70 a2=10 a3=608364cbba8db73d items=0 ppid=1 pid=1843 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:58.378000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:02:58.378000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:58.378000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:58.378000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:58.485845 env[1643]: time="2024-02-09T19:02:58.485797814Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:8bf73844-c936-4174-b3c1-43850f4358a3,Namespace:default,Attempt:0,}" Feb 9 19:02:58.661532 (udev-worker)[3934]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:02:58.666793 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:02:58.666894 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 19:02:58.663245 systemd-networkd[1459]: cali5ec59c6bf6e: Link UP Feb 9 19:02:58.666942 systemd-networkd[1459]: cali5ec59c6bf6e: Gained carrier Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.550 [INFO][3942] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.121-k8s-test--pod--1-eth0 default 8bf73844-c936-4174-b3c1-43850f4358a3 1175 0 2024-02-09 19:02:25 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.121 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.121-k8s-test--pod--1-" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.551 [INFO][3942] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.121-k8s-test--pod--1-eth0" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.592 [INFO][3954] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" HandleID="k8s-pod-network.17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Workload="172.31.22.121-k8s-test--pod--1-eth0" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.610 [INFO][3954] ipam_plugin.go 268: Auto assigning IP ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" HandleID="k8s-pod-network.17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Workload="172.31.22.121-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a80), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.121", "pod":"test-pod-1", "timestamp":"2024-02-09 19:02:58.592346593 +0000 UTC"}, Hostname:"172.31.22.121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.610 [INFO][3954] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.610 [INFO][3954] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.610 [INFO][3954] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.121' Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.612 [INFO][3954] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" host="172.31.22.121" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.624 [INFO][3954] ipam.go 372: Looking up existing affinities for host host="172.31.22.121" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.630 [INFO][3954] ipam.go 489: Trying affinity for 192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.633 [INFO][3954] ipam.go 155: Attempting to load block cidr=192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.636 [INFO][3954] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.116.192/26 host="172.31.22.121" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.637 [INFO][3954] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.116.192/26 handle="k8s-pod-network.17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" host="172.31.22.121" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.639 [INFO][3954] ipam.go 1682: Creating new handle: k8s-pod-network.17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8 Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.646 [INFO][3954] ipam.go 1203: Writing block in order to claim IPs block=192.168.116.192/26 handle="k8s-pod-network.17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" host="172.31.22.121" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.653 [INFO][3954] ipam.go 1216: Successfully claimed IPs: [192.168.116.197/26] block=192.168.116.192/26 handle="k8s-pod-network.17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" host="172.31.22.121" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.653 [INFO][3954] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.116.197/26] handle="k8s-pod-network.17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" host="172.31.22.121" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.653 [INFO][3954] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.653 [INFO][3954] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.116.197/26] IPv6=[] ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" HandleID="k8s-pod-network.17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Workload="172.31.22.121-k8s-test--pod--1-eth0" Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.656 [INFO][3942] k8s.go 385: Populated endpoint ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.121-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"8bf73844-c936-4174-b3c1-43850f4358a3", ResourceVersion:"1175", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 2, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:58.682904 env[1643]: 2024-02-09 19:02:58.656 [INFO][3942] k8s.go 386: Calico CNI using IPs: [192.168.116.197/32] ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.121-k8s-test--pod--1-eth0" Feb 9 19:02:58.684204 env[1643]: 2024-02-09 19:02:58.656 [INFO][3942] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.121-k8s-test--pod--1-eth0" Feb 9 19:02:58.684204 env[1643]: 2024-02-09 19:02:58.667 [INFO][3942] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.121-k8s-test--pod--1-eth0" Feb 9 19:02:58.684204 env[1643]: 2024-02-09 19:02:58.675 [INFO][3942] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.121-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.121-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"8bf73844-c936-4174-b3c1-43850f4358a3", ResourceVersion:"1175", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 2, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.121", ContainerID:"17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"da:72:d5:3b:2e:19", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:58.684204 env[1643]: 2024-02-09 19:02:58.681 [INFO][3942] k8s.go 491: Wrote updated endpoint to datastore ContainerID="17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.121-k8s-test--pod--1-eth0" Feb 9 19:02:58.716876 env[1643]: time="2024-02-09T19:02:58.716564941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:02:58.716876 env[1643]: time="2024-02-09T19:02:58.716630032Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:02:58.716876 env[1643]: time="2024-02-09T19:02:58.716646799Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:02:58.717647 env[1643]: time="2024-02-09T19:02:58.717582951Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8 pid=3980 runtime=io.containerd.runc.v2 Feb 9 19:02:58.730000 audit[3990]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:58.730000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=19064 a0=3 a1=7ffd51981170 a2=0 a3=7ffd5198115c items=0 ppid=2742 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:58.730000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:58.771897 systemd[1]: Started cri-containerd-17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8.scope. Feb 9 19:02:58.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.790000 audit: BPF prog-id=134 op=LOAD Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000217c48 a2=10 a3=1c items=0 ppid=3980 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:58.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653232666435393966306361396430626664386361336535613662 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002176b0 a2=3c a3=c items=0 ppid=3980 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:58.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653232666435393966306361396430626664386361336535613662 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit: BPF prog-id=135 op=LOAD Feb 9 19:02:58.791000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002179d8 a2=78 a3=c0003da9c0 items=0 ppid=3980 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:58.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653232666435393966306361396430626664386361336535613662 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.791000 audit: BPF prog-id=136 op=LOAD Feb 9 19:02:58.791000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000217770 a2=78 a3=c0003daa08 items=0 ppid=3980 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:58.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653232666435393966306361396430626664386361336535613662 Feb 9 19:02:58.791000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:02:58.792000 audit: BPF prog-id=135 op=UNLOAD Feb 9 19:02:58.792000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.792000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.792000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.792000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.792000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.792000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.792000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.792000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.792000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.792000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:58.792000 audit: BPF prog-id=137 op=LOAD Feb 9 19:02:58.792000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000217c30 a2=78 a3=c0003dae18 items=0 ppid=3980 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:58.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653232666435393966306361396430626664386361336535613662 Feb 9 19:02:58.830207 env[1643]: time="2024-02-09T19:02:58.830171723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:8bf73844-c936-4174-b3c1-43850f4358a3,Namespace:default,Attempt:0,} returns sandbox id \"17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8\"" Feb 9 19:02:58.832523 env[1643]: time="2024-02-09T19:02:58.832485557Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:02:59.050825 kubelet[2113]: E0209 19:02:59.050691 2113 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:59.125909 kubelet[2113]: E0209 19:02:59.125871 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:59.241999 env[1643]: time="2024-02-09T19:02:59.241951682Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:59.246116 env[1643]: time="2024-02-09T19:02:59.246069232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:59.249208 env[1643]: time="2024-02-09T19:02:59.249165102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:59.251729 env[1643]: time="2024-02-09T19:02:59.251684671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:59.252486 env[1643]: time="2024-02-09T19:02:59.252448336Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:02:59.256587 env[1643]: time="2024-02-09T19:02:59.256235783Z" level=info msg="CreateContainer within sandbox \"17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 19:02:59.287192 env[1643]: time="2024-02-09T19:02:59.287099084Z" level=info msg="CreateContainer within sandbox \"17e22fd599f0ca9d0bfd8ca3e5a6b80e15a2881d79834d8b9a89b310daafb0a8\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"dfba95d781ea44fadb6f6cc39d03e9a91a749d6ee57d24f0efdd762491e89bdb\"" Feb 9 19:02:59.290453 env[1643]: time="2024-02-09T19:02:59.290411730Z" level=info msg="StartContainer for \"dfba95d781ea44fadb6f6cc39d03e9a91a749d6ee57d24f0efdd762491e89bdb\"" Feb 9 19:02:59.325404 systemd[1]: Started cri-containerd-dfba95d781ea44fadb6f6cc39d03e9a91a749d6ee57d24f0efdd762491e89bdb.scope. Feb 9 19:02:59.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit: BPF prog-id=138 op=LOAD Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3980 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:59.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626139356437383165613434666164623666366363333964303365 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3980 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:59.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626139356437383165613434666164623666366363333964303365 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit: BPF prog-id=139 op=LOAD Feb 9 19:02:59.348000 audit[4027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000264720 items=0 ppid=3980 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:59.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626139356437383165613434666164623666366363333964303365 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.348000 audit: BPF prog-id=140 op=LOAD Feb 9 19:02:59.348000 audit[4027]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000264768 items=0 ppid=3980 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:59.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626139356437383165613434666164623666366363333964303365 Feb 9 19:02:59.348000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:02:59.349000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:02:59.349000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.349000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.349000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.349000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.349000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.349000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.349000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.349000 audit[4027]: AVC avc: denied { perfmon } for pid=4027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.349000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.349000 audit[4027]: AVC avc: denied { bpf } for pid=4027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:59.349000 audit: BPF prog-id=141 op=LOAD Feb 9 19:02:59.349000 audit[4027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000264b78 items=0 ppid=3980 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:59.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626139356437383165613434666164623666366363333964303365 Feb 9 19:02:59.370964 env[1643]: time="2024-02-09T19:02:59.370867314Z" level=info msg="StartContainer for \"dfba95d781ea44fadb6f6cc39d03e9a91a749d6ee57d24f0efdd762491e89bdb\" returns successfully" Feb 9 19:02:59.603738 kubelet[2113]: I0209 19:02:59.603695 2113 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=34.182687206 podCreationTimestamp="2024-02-09 19:02:25 +0000 UTC" firstStartedPulling="2024-02-09 19:02:58.831812866 +0000 UTC m=+80.130276468" lastFinishedPulling="2024-02-09 19:02:59.252782237 +0000 UTC m=+80.551245849" observedRunningTime="2024-02-09 19:02:59.603341353 +0000 UTC m=+80.901804974" watchObservedRunningTime="2024-02-09 19:02:59.603656587 +0000 UTC m=+80.902120210" Feb 9 19:03:00.126499 kubelet[2113]: E0209 19:03:00.126443 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:00.583291 systemd-networkd[1459]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 19:03:01.126725 kubelet[2113]: E0209 19:03:01.126664 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:02.127852 kubelet[2113]: E0209 19:03:02.127796 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:03.128020 kubelet[2113]: E0209 19:03:03.127965 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:04.128922 kubelet[2113]: E0209 19:03:04.128866 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:05.129189 kubelet[2113]: E0209 19:03:05.129135 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:06.129929 kubelet[2113]: E0209 19:03:06.129873 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:07.130771 kubelet[2113]: E0209 19:03:07.130722 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:07.206587 systemd[1]: run-containerd-runc-k8s.io-58a7b1223cedb4b48791b060c7490282fe4c19b8ed5078810501f87e15b2333c-runc.esSc5y.mount: Deactivated successfully. Feb 9 19:03:08.131159 kubelet[2113]: E0209 19:03:08.131100 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:09.132169 kubelet[2113]: E0209 19:03:09.132120 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:10.132637 kubelet[2113]: E0209 19:03:10.132586 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:11.045499 systemd[1]: run-containerd-runc-k8s.io-c2c9b21d76dec4ffc77e13ac872942c9bb8eafce147c9980688ea37905df909c-runc.ZNJVKb.mount: Deactivated successfully. Feb 9 19:03:11.123000 audit[4161]: NETFILTER_CFG table=filter:88 family=2 entries=9 op=nft_register_rule pid=4161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:03:11.130552 kernel: kauditd_printk_skb: 461 callbacks suppressed Feb 9 19:03:11.130695 kernel: audit: type=1325 audit(1707505391.123:981): table=filter:88 family=2 entries=9 op=nft_register_rule pid=4161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:03:11.133571 kubelet[2113]: E0209 19:03:11.133250 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:11.123000 audit[4161]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffff2a518e0 a2=0 a3=7ffff2a518cc items=0 ppid=2331 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:03:11.142492 kernel: audit: type=1300 audit(1707505391.123:981): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffff2a518e0 a2=0 a3=7ffff2a518cc items=0 ppid=2331 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:03:11.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:03:11.145900 kernel: audit: type=1327 audit(1707505391.123:981): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:03:11.146018 kernel: audit: type=1325 audit(1707505391.129:982): table=nat:89 family=2 entries=51 op=nft_register_chain pid=4161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:03:11.129000 audit[4161]: NETFILTER_CFG table=nat:89 family=2 entries=51 op=nft_register_chain pid=4161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:03:11.150116 kernel: audit: type=1300 audit(1707505391.129:982): arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7ffff2a518e0 a2=0 a3=7ffff2a518cc items=0 ppid=2331 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:03:11.129000 audit[4161]: SYSCALL arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7ffff2a518e0 a2=0 a3=7ffff2a518cc items=0 ppid=2331 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:03:11.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:03:11.161786 kernel: audit: type=1327 audit(1707505391.129:982): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:03:12.134642 kubelet[2113]: E0209 19:03:12.134591 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:13.135326 kubelet[2113]: E0209 19:03:13.135290 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:14.136305 kubelet[2113]: E0209 19:03:14.136251 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:15.137093 kubelet[2113]: E0209 19:03:15.137053 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:16.137951 kubelet[2113]: E0209 19:03:16.137896 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:17.138424 kubelet[2113]: E0209 19:03:17.138369 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:18.139168 kubelet[2113]: E0209 19:03:18.139114 2113 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"