Feb 12 21:56:31.085287 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 21:56:31.085324 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 21:56:31.085340 kernel: BIOS-provided physical RAM map: Feb 12 21:56:31.085351 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 21:56:31.085362 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 21:56:31.085373 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 21:56:31.085389 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Feb 12 21:56:31.085401 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Feb 12 21:56:31.085413 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Feb 12 21:56:31.085425 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 21:56:31.085437 kernel: NX (Execute Disable) protection: active Feb 12 21:56:31.085448 kernel: SMBIOS 2.7 present. Feb 12 21:56:31.085460 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Feb 12 21:56:31.085471 kernel: Hypervisor detected: KVM Feb 12 21:56:31.085504 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 21:56:31.085523 kernel: kvm-clock: cpu 0, msr 31faa001, primary cpu clock Feb 12 21:56:31.085537 kernel: kvm-clock: using sched offset of 6993667735 cycles Feb 12 21:56:31.085552 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 21:56:31.085565 kernel: tsc: Detected 2499.998 MHz processor Feb 12 21:56:31.085579 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 21:56:31.085596 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 21:56:31.085609 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Feb 12 21:56:31.085622 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 21:56:31.085635 kernel: Using GB pages for direct mapping Feb 12 21:56:31.085648 kernel: ACPI: Early table checksum verification disabled Feb 12 21:56:31.085661 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Feb 12 21:56:31.085673 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Feb 12 21:56:31.085686 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 12 21:56:31.085699 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Feb 12 21:56:31.085714 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Feb 12 21:56:31.085727 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 21:56:31.085740 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 12 21:56:31.085753 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Feb 12 21:56:31.085765 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 12 21:56:31.085778 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Feb 12 21:56:31.085791 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Feb 12 21:56:31.085803 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 21:56:31.085819 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Feb 12 21:56:31.085832 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Feb 12 21:56:31.085845 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Feb 12 21:56:31.085864 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Feb 12 21:56:31.085877 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Feb 12 21:56:31.085890 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Feb 12 21:56:31.085905 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Feb 12 21:56:31.085921 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Feb 12 21:56:31.085934 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Feb 12 21:56:31.085948 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Feb 12 21:56:31.085962 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 21:56:31.085976 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 21:56:31.085989 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Feb 12 21:56:31.086003 kernel: NUMA: Initialized distance table, cnt=1 Feb 12 21:56:31.086015 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Feb 12 21:56:31.086104 kernel: Zone ranges: Feb 12 21:56:31.086119 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 21:56:31.086134 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Feb 12 21:56:31.086148 kernel: Normal empty Feb 12 21:56:31.086162 kernel: Movable zone start for each node Feb 12 21:56:31.086176 kernel: Early memory node ranges Feb 12 21:56:31.086189 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 21:56:31.086203 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Feb 12 21:56:31.086217 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Feb 12 21:56:31.086235 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 21:56:31.086249 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 21:56:31.086262 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Feb 12 21:56:31.086276 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 21:56:31.086309 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 21:56:31.086326 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Feb 12 21:56:31.086340 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 21:56:31.086354 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 21:56:31.086368 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 21:56:31.086386 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 21:56:31.086399 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 21:56:31.086413 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 21:56:31.086427 kernel: TSC deadline timer available Feb 12 21:56:31.086441 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 21:56:31.086455 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Feb 12 21:56:31.086468 kernel: Booting paravirtualized kernel on KVM Feb 12 21:56:31.086482 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 21:56:31.086510 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 21:56:31.086612 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 21:56:31.086628 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 21:56:31.086642 kernel: pcpu-alloc: [0] 0 1 Feb 12 21:56:31.086656 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Feb 12 21:56:31.086670 kernel: kvm-guest: PV spinlocks enabled Feb 12 21:56:31.086685 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 21:56:31.086740 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Feb 12 21:56:31.086754 kernel: Policy zone: DMA32 Feb 12 21:56:31.086770 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 21:56:31.086788 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 21:56:31.086829 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 21:56:31.086843 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 21:56:31.086858 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 21:56:31.086872 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved) Feb 12 21:56:31.086911 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 21:56:31.086926 kernel: Kernel/User page tables isolation: enabled Feb 12 21:56:31.086940 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 21:56:31.086957 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 21:56:31.086995 kernel: rcu: Hierarchical RCU implementation. Feb 12 21:56:31.087010 kernel: rcu: RCU event tracing is enabled. Feb 12 21:56:31.087024 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 21:56:31.087038 kernel: Rude variant of Tasks RCU enabled. Feb 12 21:56:31.087073 kernel: Tracing variant of Tasks RCU enabled. Feb 12 21:56:31.087089 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 21:56:31.087103 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 21:56:31.087175 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 21:56:31.087200 kernel: random: crng init done Feb 12 21:56:31.087245 kernel: Console: colour VGA+ 80x25 Feb 12 21:56:31.087262 kernel: printk: console [ttyS0] enabled Feb 12 21:56:31.087276 kernel: ACPI: Core revision 20210730 Feb 12 21:56:31.087290 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Feb 12 21:56:31.087304 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 21:56:31.087318 kernel: x2apic enabled Feb 12 21:56:31.087332 kernel: Switched APIC routing to physical x2apic. Feb 12 21:56:31.087346 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Feb 12 21:56:31.087364 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Feb 12 21:56:31.087378 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 21:56:31.087392 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 21:56:31.087406 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 21:56:31.087431 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 21:56:31.087448 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 21:56:31.087462 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 21:56:31.087477 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 12 21:56:31.087578 kernel: RETBleed: Vulnerable Feb 12 21:56:31.087593 kernel: Speculative Store Bypass: Vulnerable Feb 12 21:56:31.087607 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 21:56:31.087622 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 21:56:31.087636 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 21:56:31.087650 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 21:56:31.087668 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 21:56:31.087683 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 21:56:31.087698 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 12 21:56:31.087712 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 12 21:56:31.087727 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 12 21:56:31.087744 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 12 21:56:31.087758 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 12 21:56:31.087771 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Feb 12 21:56:31.087786 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 21:56:31.087800 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 12 21:56:31.087815 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 12 21:56:31.087887 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Feb 12 21:56:31.087907 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Feb 12 21:56:31.087923 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Feb 12 21:56:31.087937 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Feb 12 21:56:31.087952 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Feb 12 21:56:31.087967 kernel: Freeing SMP alternatives memory: 32K Feb 12 21:56:31.087985 kernel: pid_max: default: 32768 minimum: 301 Feb 12 21:56:31.087999 kernel: LSM: Security Framework initializing Feb 12 21:56:31.088013 kernel: SELinux: Initializing. Feb 12 21:56:31.088028 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 21:56:31.088043 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 21:56:31.088058 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 12 21:56:31.088073 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 12 21:56:31.088088 kernel: signal: max sigframe size: 3632 Feb 12 21:56:31.088103 kernel: rcu: Hierarchical SRCU implementation. Feb 12 21:56:31.088118 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 21:56:31.088135 kernel: smp: Bringing up secondary CPUs ... Feb 12 21:56:31.088150 kernel: x86: Booting SMP configuration: Feb 12 21:56:31.088165 kernel: .... node #0, CPUs: #1 Feb 12 21:56:31.088180 kernel: kvm-clock: cpu 1, msr 31faa041, secondary cpu clock Feb 12 21:56:31.088195 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Feb 12 21:56:31.088211 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 12 21:56:31.088227 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 21:56:31.088242 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 21:56:31.088256 kernel: smpboot: Max logical packages: 1 Feb 12 21:56:31.088274 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Feb 12 21:56:31.088288 kernel: devtmpfs: initialized Feb 12 21:56:31.088303 kernel: x86/mm: Memory block size: 128MB Feb 12 21:56:31.088318 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 21:56:31.088333 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 21:56:31.088347 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 21:56:31.088362 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 21:56:31.088377 kernel: audit: initializing netlink subsys (disabled) Feb 12 21:56:31.088391 kernel: audit: type=2000 audit(1707774990.748:1): state=initialized audit_enabled=0 res=1 Feb 12 21:56:31.088409 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 21:56:31.088423 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 21:56:31.088438 kernel: cpuidle: using governor menu Feb 12 21:56:31.088453 kernel: ACPI: bus type PCI registered Feb 12 21:56:31.096554 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 21:56:31.096584 kernel: dca service started, version 1.12.1 Feb 12 21:56:31.096599 kernel: PCI: Using configuration type 1 for base access Feb 12 21:56:31.096614 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 21:56:31.096628 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 21:56:31.096652 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 21:56:31.096666 kernel: ACPI: Added _OSI(Module Device) Feb 12 21:56:31.096680 kernel: ACPI: Added _OSI(Processor Device) Feb 12 21:56:31.096695 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 21:56:31.096709 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 21:56:31.096723 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 21:56:31.096737 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 21:56:31.096751 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 21:56:31.096858 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 12 21:56:31.096878 kernel: ACPI: Interpreter enabled Feb 12 21:56:31.096893 kernel: ACPI: PM: (supports S0 S5) Feb 12 21:56:31.096907 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 21:56:31.096922 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 21:56:31.096936 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 12 21:56:31.096968 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 21:56:31.097197 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 21:56:31.097324 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 21:56:31.097346 kernel: acpiphp: Slot [3] registered Feb 12 21:56:31.097361 kernel: acpiphp: Slot [4] registered Feb 12 21:56:31.097376 kernel: acpiphp: Slot [5] registered Feb 12 21:56:31.097391 kernel: acpiphp: Slot [6] registered Feb 12 21:56:31.097406 kernel: acpiphp: Slot [7] registered Feb 12 21:56:31.097420 kernel: acpiphp: Slot [8] registered Feb 12 21:56:31.097434 kernel: acpiphp: Slot [9] registered Feb 12 21:56:31.097449 kernel: acpiphp: Slot [10] registered Feb 12 21:56:31.097463 kernel: acpiphp: Slot [11] registered Feb 12 21:56:31.097481 kernel: acpiphp: Slot [12] registered Feb 12 21:56:31.097506 kernel: acpiphp: Slot [13] registered Feb 12 21:56:31.097589 kernel: acpiphp: Slot [14] registered Feb 12 21:56:31.097606 kernel: acpiphp: Slot [15] registered Feb 12 21:56:31.097622 kernel: acpiphp: Slot [16] registered Feb 12 21:56:31.097636 kernel: acpiphp: Slot [17] registered Feb 12 21:56:31.097651 kernel: acpiphp: Slot [18] registered Feb 12 21:56:31.097665 kernel: acpiphp: Slot [19] registered Feb 12 21:56:31.097679 kernel: acpiphp: Slot [20] registered Feb 12 21:56:31.097697 kernel: acpiphp: Slot [21] registered Feb 12 21:56:31.097712 kernel: acpiphp: Slot [22] registered Feb 12 21:56:31.097726 kernel: acpiphp: Slot [23] registered Feb 12 21:56:31.097740 kernel: acpiphp: Slot [24] registered Feb 12 21:56:31.097755 kernel: acpiphp: Slot [25] registered Feb 12 21:56:31.097769 kernel: acpiphp: Slot [26] registered Feb 12 21:56:31.097783 kernel: acpiphp: Slot [27] registered Feb 12 21:56:31.097798 kernel: acpiphp: Slot [28] registered Feb 12 21:56:31.097812 kernel: acpiphp: Slot [29] registered Feb 12 21:56:31.097827 kernel: acpiphp: Slot [30] registered Feb 12 21:56:31.097844 kernel: acpiphp: Slot [31] registered Feb 12 21:56:31.097859 kernel: PCI host bridge to bus 0000:00 Feb 12 21:56:31.098003 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 21:56:31.098118 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 21:56:31.098309 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 21:56:31.098426 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 21:56:31.098550 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 21:56:31.098691 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 21:56:31.098824 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 21:56:31.099067 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Feb 12 21:56:31.099199 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 21:56:31.099324 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 12 21:56:31.099447 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Feb 12 21:56:31.099582 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Feb 12 21:56:31.099710 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Feb 12 21:56:31.099832 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Feb 12 21:56:31.099954 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Feb 12 21:56:31.100086 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Feb 12 21:56:31.100212 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Feb 12 21:56:31.100331 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Feb 12 21:56:31.100449 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 12 21:56:31.112706 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 21:56:31.112879 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 12 21:56:31.113012 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Feb 12 21:56:31.113229 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 12 21:56:31.113364 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Feb 12 21:56:31.113385 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 21:56:31.113408 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 21:56:31.113423 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 21:56:31.113438 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 21:56:31.113453 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 21:56:31.113469 kernel: iommu: Default domain type: Translated Feb 12 21:56:31.113484 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 21:56:31.113623 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Feb 12 21:56:31.113748 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 21:56:31.113875 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Feb 12 21:56:31.113898 kernel: vgaarb: loaded Feb 12 21:56:31.113913 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 21:56:31.113928 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 21:56:31.113944 kernel: PTP clock support registered Feb 12 21:56:31.113958 kernel: PCI: Using ACPI for IRQ routing Feb 12 21:56:31.113974 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 21:56:31.113989 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 21:56:31.114004 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Feb 12 21:56:31.114021 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 12 21:56:31.114036 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Feb 12 21:56:31.114051 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 21:56:31.114066 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 21:56:31.114081 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 21:56:31.114097 kernel: pnp: PnP ACPI init Feb 12 21:56:31.114112 kernel: pnp: PnP ACPI: found 5 devices Feb 12 21:56:31.114127 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 21:56:31.114142 kernel: NET: Registered PF_INET protocol family Feb 12 21:56:31.114160 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 21:56:31.114174 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 21:56:31.114189 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 21:56:31.114204 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 21:56:31.114219 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 21:56:31.114234 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 21:56:31.114249 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 21:56:31.114264 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 21:56:31.114279 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 21:56:31.114304 kernel: NET: Registered PF_XDP protocol family Feb 12 21:56:31.114436 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 21:56:31.114564 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 21:56:31.114677 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 21:56:31.114787 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 21:56:31.114916 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 21:56:31.115047 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 21:56:31.115070 kernel: PCI: CLS 0 bytes, default 64 Feb 12 21:56:31.115085 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 21:56:31.115101 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Feb 12 21:56:31.115117 kernel: clocksource: Switched to clocksource tsc Feb 12 21:56:31.115132 kernel: Initialise system trusted keyrings Feb 12 21:56:31.115147 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 21:56:31.115162 kernel: Key type asymmetric registered Feb 12 21:56:31.115176 kernel: Asymmetric key parser 'x509' registered Feb 12 21:56:31.115189 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 21:56:31.115204 kernel: io scheduler mq-deadline registered Feb 12 21:56:31.115218 kernel: io scheduler kyber registered Feb 12 21:56:31.115235 kernel: io scheduler bfq registered Feb 12 21:56:31.115252 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 21:56:31.115268 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 21:56:31.115287 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 21:56:31.115300 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 21:56:31.115314 kernel: i8042: Warning: Keylock active Feb 12 21:56:31.115329 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 21:56:31.115346 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 21:56:31.115503 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 12 21:56:31.115623 kernel: rtc_cmos 00:00: registered as rtc0 Feb 12 21:56:31.115735 kernel: rtc_cmos 00:00: setting system clock to 2024-02-12T21:56:30 UTC (1707774990) Feb 12 21:56:31.115846 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 12 21:56:31.115863 kernel: intel_pstate: CPU model not supported Feb 12 21:56:31.115879 kernel: NET: Registered PF_INET6 protocol family Feb 12 21:56:31.115893 kernel: Segment Routing with IPv6 Feb 12 21:56:31.115911 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 21:56:31.115925 kernel: NET: Registered PF_PACKET protocol family Feb 12 21:56:31.115940 kernel: Key type dns_resolver registered Feb 12 21:56:31.115954 kernel: IPI shorthand broadcast: enabled Feb 12 21:56:31.115969 kernel: sched_clock: Marking stable (390245993, 266817230)->(788102580, -131039357) Feb 12 21:56:31.115984 kernel: registered taskstats version 1 Feb 12 21:56:31.115998 kernel: Loading compiled-in X.509 certificates Feb 12 21:56:31.116012 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 21:56:31.116026 kernel: Key type .fscrypt registered Feb 12 21:56:31.116042 kernel: Key type fscrypt-provisioning registered Feb 12 21:56:31.116057 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 21:56:31.116072 kernel: ima: Allocated hash algorithm: sha1 Feb 12 21:56:31.116086 kernel: ima: No architecture policies found Feb 12 21:56:31.116100 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 21:56:31.116115 kernel: Write protecting the kernel read-only data: 28672k Feb 12 21:56:31.116129 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 21:56:31.116144 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 21:56:31.116158 kernel: Run /init as init process Feb 12 21:56:31.116175 kernel: with arguments: Feb 12 21:56:31.116190 kernel: /init Feb 12 21:56:31.116204 kernel: with environment: Feb 12 21:56:31.116218 kernel: HOME=/ Feb 12 21:56:31.116232 kernel: TERM=linux Feb 12 21:56:31.116246 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 21:56:31.116264 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 21:56:31.116282 systemd[1]: Detected virtualization amazon. Feb 12 21:56:31.116300 systemd[1]: Detected architecture x86-64. Feb 12 21:56:31.116318 systemd[1]: Running in initrd. Feb 12 21:56:31.116333 systemd[1]: No hostname configured, using default hostname. Feb 12 21:56:31.116348 systemd[1]: Hostname set to . Feb 12 21:56:31.116380 systemd[1]: Initializing machine ID from VM UUID. Feb 12 21:56:31.116399 systemd[1]: Queued start job for default target initrd.target. Feb 12 21:56:31.116414 systemd[1]: Started systemd-ask-password-console.path. Feb 12 21:56:31.116430 systemd[1]: Reached target cryptsetup.target. Feb 12 21:56:31.116446 systemd[1]: Reached target paths.target. Feb 12 21:56:31.116461 systemd[1]: Reached target slices.target. Feb 12 21:56:31.116476 systemd[1]: Reached target swap.target. Feb 12 21:56:31.121620 systemd[1]: Reached target timers.target. Feb 12 21:56:31.121651 systemd[1]: Listening on iscsid.socket. Feb 12 21:56:31.121681 systemd[1]: Listening on iscsiuio.socket. Feb 12 21:56:31.121695 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 21:56:31.121709 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 21:56:31.121722 systemd[1]: Listening on systemd-journald.socket. Feb 12 21:56:31.121736 systemd[1]: Listening on systemd-networkd.socket. Feb 12 21:56:31.121754 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 21:56:31.121772 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 21:56:31.121788 systemd[1]: Reached target sockets.target. Feb 12 21:56:31.121804 systemd[1]: Starting kmod-static-nodes.service... Feb 12 21:56:31.121823 systemd[1]: Finished network-cleanup.service. Feb 12 21:56:31.121839 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 21:56:31.121855 systemd[1]: Starting systemd-journald.service... Feb 12 21:56:31.121871 systemd[1]: Starting systemd-modules-load.service... Feb 12 21:56:31.121887 systemd[1]: Starting systemd-resolved.service... Feb 12 21:56:31.121903 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 21:56:31.121920 systemd[1]: Finished kmod-static-nodes.service. Feb 12 21:56:31.121936 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 21:56:31.121952 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 21:56:31.121971 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 21:56:31.121987 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 21:56:31.122004 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 21:56:31.122020 kernel: Bridge firewalling registered Feb 12 21:56:31.122035 kernel: SCSI subsystem initialized Feb 12 21:56:31.122051 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 21:56:31.122066 kernel: device-mapper: uevent: version 1.0.3 Feb 12 21:56:31.122085 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 21:56:31.122110 systemd-journald[185]: Journal started Feb 12 21:56:31.122272 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2c0169e349ef22b4afc3a48ebe2f62) is 4.8M, max 38.7M, 33.9M free. Feb 12 21:56:31.040630 systemd-modules-load[186]: Inserted module 'overlay' Feb 12 21:56:31.080291 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 12 21:56:31.239052 systemd[1]: Started systemd-journald.service. Feb 12 21:56:31.243960 kernel: audit: type=1130 audit(1707774991.231:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.243977 kernel: audit: type=1130 audit(1707774991.236:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.134601 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 12 21:56:31.250967 kernel: audit: type=1130 audit(1707774991.238:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.138277 systemd-resolved[187]: Positive Trust Anchors: Feb 12 21:56:31.258077 kernel: audit: type=1130 audit(1707774991.250:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.258111 kernel: audit: type=1130 audit(1707774991.256:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.138295 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 21:56:31.138347 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 21:56:31.142500 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 12 21:56:31.237630 systemd[1]: Started systemd-resolved.service. Feb 12 21:56:31.244223 systemd[1]: Finished systemd-modules-load.service. Feb 12 21:56:31.251248 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 21:56:31.257408 systemd[1]: Reached target nss-lookup.target. Feb 12 21:56:31.283576 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 21:56:31.286631 systemd[1]: Starting systemd-sysctl.service... Feb 12 21:56:31.312975 systemd[1]: Finished systemd-sysctl.service. Feb 12 21:56:31.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.324523 kernel: audit: type=1130 audit(1707774991.312:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.326934 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 21:56:31.329283 systemd[1]: Starting dracut-cmdline.service... Feb 12 21:56:31.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.339833 kernel: audit: type=1130 audit(1707774991.326:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.346417 dracut-cmdline[207]: dracut-dracut-053 Feb 12 21:56:31.350686 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 21:56:31.439511 kernel: Loading iSCSI transport class v2.0-870. Feb 12 21:56:31.463514 kernel: iscsi: registered transport (tcp) Feb 12 21:56:31.498359 kernel: iscsi: registered transport (qla4xxx) Feb 12 21:56:31.498434 kernel: QLogic iSCSI HBA Driver Feb 12 21:56:31.542567 systemd[1]: Finished dracut-cmdline.service. Feb 12 21:56:31.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.551517 kernel: audit: type=1130 audit(1707774991.544:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:31.549937 systemd[1]: Starting dracut-pre-udev.service... Feb 12 21:56:31.625549 kernel: raid6: avx512x4 gen() 13864 MB/s Feb 12 21:56:31.642543 kernel: raid6: avx512x4 xor() 6648 MB/s Feb 12 21:56:31.660531 kernel: raid6: avx512x2 gen() 14295 MB/s Feb 12 21:56:31.677536 kernel: raid6: avx512x2 xor() 19917 MB/s Feb 12 21:56:31.694541 kernel: raid6: avx512x1 gen() 12982 MB/s Feb 12 21:56:31.711539 kernel: raid6: avx512x1 xor() 18129 MB/s Feb 12 21:56:31.728537 kernel: raid6: avx2x4 gen() 15745 MB/s Feb 12 21:56:31.745528 kernel: raid6: avx2x4 xor() 6412 MB/s Feb 12 21:56:31.762531 kernel: raid6: avx2x2 gen() 14255 MB/s Feb 12 21:56:31.779538 kernel: raid6: avx2x2 xor() 15706 MB/s Feb 12 21:56:31.796535 kernel: raid6: avx2x1 gen() 12188 MB/s Feb 12 21:56:31.814523 kernel: raid6: avx2x1 xor() 13788 MB/s Feb 12 21:56:31.832564 kernel: raid6: sse2x4 gen() 8138 MB/s Feb 12 21:56:31.851525 kernel: raid6: sse2x4 xor() 4872 MB/s Feb 12 21:56:31.870666 kernel: raid6: sse2x2 gen() 5140 MB/s Feb 12 21:56:31.888539 kernel: raid6: sse2x2 xor() 5663 MB/s Feb 12 21:56:31.905538 kernel: raid6: sse2x1 gen() 7992 MB/s Feb 12 21:56:31.923813 kernel: raid6: sse2x1 xor() 4395 MB/s Feb 12 21:56:31.923903 kernel: raid6: using algorithm avx2x4 gen() 15745 MB/s Feb 12 21:56:31.923922 kernel: raid6: .... xor() 6412 MB/s, rmw enabled Feb 12 21:56:31.924795 kernel: raid6: using avx512x2 recovery algorithm Feb 12 21:56:31.940516 kernel: xor: automatically using best checksumming function avx Feb 12 21:56:32.070523 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 21:56:32.080951 systemd[1]: Finished dracut-pre-udev.service. Feb 12 21:56:32.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:32.084298 systemd[1]: Starting systemd-udevd.service... Feb 12 21:56:32.091896 kernel: audit: type=1130 audit(1707774992.082:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:32.083000 audit: BPF prog-id=7 op=LOAD Feb 12 21:56:32.083000 audit: BPF prog-id=8 op=LOAD Feb 12 21:56:32.105219 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 12 21:56:32.113913 systemd[1]: Started systemd-udevd.service. Feb 12 21:56:32.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:32.118167 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 21:56:32.143510 dracut-pre-trigger[393]: rd.md=0: removing MD RAID activation Feb 12 21:56:32.197586 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 21:56:32.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:32.200576 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 21:56:32.256894 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 21:56:32.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:32.333512 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 21:56:32.369299 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 12 21:56:32.370241 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 21:56:32.374090 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 12 21:56:32.374421 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 12 21:56:32.379568 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Feb 12 21:56:32.380192 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 12 21:56:32.386023 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 21:56:32.386085 kernel: AES CTR mode by8 optimization enabled Feb 12 21:56:32.389567 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:b2:99:ee:b6:4d Feb 12 21:56:32.389790 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 21:56:32.392442 kernel: GPT:9289727 != 16777215 Feb 12 21:56:32.392495 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 21:56:32.394536 kernel: GPT:9289727 != 16777215 Feb 12 21:56:32.394721 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 21:56:32.394741 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 21:56:32.399821 (udev-worker)[431]: Network interface NamePolicy= disabled on kernel command line. Feb 12 21:56:32.575279 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (427) Feb 12 21:56:32.534086 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 21:56:32.585055 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 21:56:32.630297 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 21:56:32.659759 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 21:56:32.659900 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 21:56:32.666600 systemd[1]: Starting disk-uuid.service... Feb 12 21:56:32.676999 disk-uuid[588]: Primary Header is updated. Feb 12 21:56:32.676999 disk-uuid[588]: Secondary Entries is updated. Feb 12 21:56:32.676999 disk-uuid[588]: Secondary Header is updated. Feb 12 21:56:32.683505 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 21:56:32.689516 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 21:56:33.696727 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 21:56:33.696800 disk-uuid[589]: The operation has completed successfully. Feb 12 21:56:33.857945 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 21:56:33.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:33.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:33.858059 systemd[1]: Finished disk-uuid.service. Feb 12 21:56:33.860737 systemd[1]: Starting verity-setup.service... Feb 12 21:56:33.890552 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 21:56:33.984767 systemd[1]: Found device dev-mapper-usr.device. Feb 12 21:56:33.988668 systemd[1]: Mounting sysusr-usr.mount... Feb 12 21:56:33.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:33.990638 systemd[1]: Finished verity-setup.service. Feb 12 21:56:34.100667 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 21:56:34.100727 systemd[1]: Mounted sysusr-usr.mount. Feb 12 21:56:34.100944 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 21:56:34.101649 systemd[1]: Starting ignition-setup.service... Feb 12 21:56:34.106125 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 21:56:34.130584 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 21:56:34.130654 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 21:56:34.130667 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 21:56:34.142523 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 21:56:34.156826 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 21:56:34.197280 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 21:56:34.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:34.198000 audit: BPF prog-id=9 op=LOAD Feb 12 21:56:34.200879 systemd[1]: Starting systemd-networkd.service... Feb 12 21:56:34.210958 systemd[1]: Finished ignition-setup.service. Feb 12 21:56:34.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:34.214475 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 21:56:34.231941 systemd-networkd[1099]: lo: Link UP Feb 12 21:56:34.231953 systemd-networkd[1099]: lo: Gained carrier Feb 12 21:56:34.232734 systemd-networkd[1099]: Enumeration completed Feb 12 21:56:34.233080 systemd-networkd[1099]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 21:56:34.236138 systemd[1]: Started systemd-networkd.service. Feb 12 21:56:34.239465 systemd-networkd[1099]: eth0: Link UP Feb 12 21:56:34.239474 systemd-networkd[1099]: eth0: Gained carrier Feb 12 21:56:34.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:34.242421 systemd[1]: Reached target network.target. Feb 12 21:56:34.246868 systemd[1]: Starting iscsiuio.service... Feb 12 21:56:34.250599 systemd-networkd[1099]: eth0: DHCPv4 address 172.31.16.216/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 21:56:34.262943 systemd[1]: Started iscsiuio.service. Feb 12 21:56:34.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:34.265002 systemd[1]: Starting iscsid.service... Feb 12 21:56:34.273361 iscsid[1106]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 21:56:34.273361 iscsid[1106]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 21:56:34.273361 iscsid[1106]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 21:56:34.273361 iscsid[1106]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 21:56:34.273361 iscsid[1106]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 21:56:34.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:34.289008 iscsid[1106]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 21:56:34.275635 systemd[1]: Started iscsid.service. Feb 12 21:56:34.301747 systemd[1]: Starting dracut-initqueue.service... Feb 12 21:56:34.318930 systemd[1]: Finished dracut-initqueue.service. Feb 12 21:56:34.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:34.319183 systemd[1]: Reached target remote-fs-pre.target. Feb 12 21:56:34.321857 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 21:56:34.322943 systemd[1]: Reached target remote-fs.target. Feb 12 21:56:34.324139 systemd[1]: Starting dracut-pre-mount.service... Feb 12 21:56:34.340692 systemd[1]: Finished dracut-pre-mount.service. Feb 12 21:56:34.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:34.923988 ignition[1101]: Ignition 2.14.0 Feb 12 21:56:34.924003 ignition[1101]: Stage: fetch-offline Feb 12 21:56:34.924106 ignition[1101]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:56:34.924136 ignition[1101]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:56:34.939014 ignition[1101]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:56:34.939647 ignition[1101]: Ignition finished successfully Feb 12 21:56:34.943124 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 21:56:34.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:34.945731 systemd[1]: Starting ignition-fetch.service... Feb 12 21:56:34.956005 ignition[1125]: Ignition 2.14.0 Feb 12 21:56:34.956018 ignition[1125]: Stage: fetch Feb 12 21:56:34.956215 ignition[1125]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:56:34.956247 ignition[1125]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:56:34.965285 ignition[1125]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:56:34.966852 ignition[1125]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:56:34.983869 ignition[1125]: INFO : PUT result: OK Feb 12 21:56:34.986957 ignition[1125]: DEBUG : parsed url from cmdline: "" Feb 12 21:56:34.986957 ignition[1125]: INFO : no config URL provided Feb 12 21:56:34.986957 ignition[1125]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 12 21:56:34.991261 ignition[1125]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 12 21:56:34.991261 ignition[1125]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:56:34.991261 ignition[1125]: INFO : PUT result: OK Feb 12 21:56:34.991261 ignition[1125]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 12 21:56:34.997682 ignition[1125]: INFO : GET result: OK Feb 12 21:56:34.998665 ignition[1125]: DEBUG : parsing config with SHA512: f6600bb86c01f4c272eba03b2a7172f04c17664a2f861c38a31daeb4c194c468fb403e54db50360669bcd4b1d44402afcf8fff963d29da662f04e20f37047552 Feb 12 21:56:35.020654 unknown[1125]: fetched base config from "system" Feb 12 21:56:35.020668 unknown[1125]: fetched base config from "system" Feb 12 21:56:35.020676 unknown[1125]: fetched user config from "aws" Feb 12 21:56:35.024660 ignition[1125]: fetch: fetch complete Feb 12 21:56:35.024674 ignition[1125]: fetch: fetch passed Feb 12 21:56:35.024736 ignition[1125]: Ignition finished successfully Feb 12 21:56:35.028374 systemd[1]: Finished ignition-fetch.service. Feb 12 21:56:35.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:35.030650 systemd[1]: Starting ignition-kargs.service... Feb 12 21:56:35.042695 ignition[1131]: Ignition 2.14.0 Feb 12 21:56:35.042709 ignition[1131]: Stage: kargs Feb 12 21:56:35.042919 ignition[1131]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:56:35.042952 ignition[1131]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:56:35.053650 ignition[1131]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:56:35.055527 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:56:35.058339 ignition[1131]: INFO : PUT result: OK Feb 12 21:56:35.061540 ignition[1131]: kargs: kargs passed Feb 12 21:56:35.061605 ignition[1131]: Ignition finished successfully Feb 12 21:56:35.063976 systemd[1]: Finished ignition-kargs.service. Feb 12 21:56:35.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:35.067035 systemd[1]: Starting ignition-disks.service... Feb 12 21:56:35.075680 ignition[1137]: Ignition 2.14.0 Feb 12 21:56:35.075691 ignition[1137]: Stage: disks Feb 12 21:56:35.075834 ignition[1137]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:56:35.075857 ignition[1137]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:56:35.084746 ignition[1137]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:56:35.086192 ignition[1137]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:56:35.087930 ignition[1137]: INFO : PUT result: OK Feb 12 21:56:35.091111 ignition[1137]: disks: disks passed Feb 12 21:56:35.091246 ignition[1137]: Ignition finished successfully Feb 12 21:56:35.093776 systemd[1]: Finished ignition-disks.service. Feb 12 21:56:35.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:35.093991 systemd[1]: Reached target initrd-root-device.target. Feb 12 21:56:35.097803 systemd[1]: Reached target local-fs-pre.target. Feb 12 21:56:35.099104 systemd[1]: Reached target local-fs.target. Feb 12 21:56:35.101644 systemd[1]: Reached target sysinit.target. Feb 12 21:56:35.108282 systemd[1]: Reached target basic.target. Feb 12 21:56:35.111784 systemd[1]: Starting systemd-fsck-root.service... Feb 12 21:56:35.151944 systemd-fsck[1145]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 21:56:35.157769 systemd[1]: Finished systemd-fsck-root.service. Feb 12 21:56:35.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:35.162663 systemd[1]: Mounting sysroot.mount... Feb 12 21:56:35.186022 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 21:56:35.185946 systemd[1]: Mounted sysroot.mount. Feb 12 21:56:35.195260 systemd[1]: Reached target initrd-root-fs.target. Feb 12 21:56:35.212532 systemd[1]: Mounting sysroot-usr.mount... Feb 12 21:56:35.214523 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 21:56:35.214660 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 21:56:35.214694 systemd[1]: Reached target ignition-diskful.target. Feb 12 21:56:35.218226 systemd[1]: Mounted sysroot-usr.mount. Feb 12 21:56:35.238910 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 21:56:35.243283 systemd[1]: Starting initrd-setup-root.service... Feb 12 21:56:35.260519 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1162) Feb 12 21:56:35.263517 initrd-setup-root[1167]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 21:56:35.270645 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 21:56:35.270682 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 21:56:35.270701 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 21:56:35.277605 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 21:56:35.280460 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 21:56:35.295792 initrd-setup-root[1193]: cut: /sysroot/etc/group: No such file or directory Feb 12 21:56:35.302558 initrd-setup-root[1201]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 21:56:35.309623 initrd-setup-root[1209]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 21:56:35.513391 systemd[1]: Finished initrd-setup-root.service. Feb 12 21:56:35.523384 kernel: kauditd_printk_skb: 21 callbacks suppressed Feb 12 21:56:35.523427 kernel: audit: type=1130 audit(1707774995.513:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:35.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:35.514705 systemd[1]: Starting ignition-mount.service... Feb 12 21:56:35.528152 systemd[1]: Starting sysroot-boot.service... Feb 12 21:56:35.534191 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 21:56:35.535534 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 21:56:35.564318 ignition[1228]: INFO : Ignition 2.14.0 Feb 12 21:56:35.564318 ignition[1228]: INFO : Stage: mount Feb 12 21:56:35.568466 ignition[1228]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:56:35.568466 ignition[1228]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:56:35.584847 systemd[1]: Finished sysroot-boot.service. Feb 12 21:56:35.596938 kernel: audit: type=1130 audit(1707774995.586:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:35.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:35.597120 ignition[1228]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:56:35.597120 ignition[1228]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:56:35.600218 ignition[1228]: INFO : PUT result: OK Feb 12 21:56:35.607694 ignition[1228]: INFO : mount: mount passed Feb 12 21:56:35.609276 ignition[1228]: INFO : Ignition finished successfully Feb 12 21:56:35.614109 systemd[1]: Finished ignition-mount.service. Feb 12 21:56:35.615479 systemd[1]: Starting ignition-files.service... Feb 12 21:56:35.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:35.627263 kernel: audit: type=1130 audit(1707774995.613:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:35.630707 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 21:56:35.643513 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1238) Feb 12 21:56:35.643570 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 21:56:35.646279 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 21:56:35.646318 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 21:56:35.653528 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 21:56:35.655561 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 21:56:35.667863 ignition[1257]: INFO : Ignition 2.14.0 Feb 12 21:56:35.667863 ignition[1257]: INFO : Stage: files Feb 12 21:56:35.669893 ignition[1257]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:56:35.669893 ignition[1257]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:56:35.680436 ignition[1257]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:56:35.682064 ignition[1257]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:56:35.683576 ignition[1257]: INFO : PUT result: OK Feb 12 21:56:35.687804 ignition[1257]: DEBUG : files: compiled without relabeling support, skipping Feb 12 21:56:35.691180 ignition[1257]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 21:56:35.691180 ignition[1257]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 21:56:35.702130 ignition[1257]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 21:56:35.704254 ignition[1257]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 21:56:35.707022 unknown[1257]: wrote ssh authorized keys file for user: core Feb 12 21:56:35.708697 ignition[1257]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 21:56:35.710527 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 21:56:35.710527 ignition[1257]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 21:56:35.954655 systemd-networkd[1099]: eth0: Gained IPv6LL Feb 12 21:56:37.133366 ignition[1257]: INFO : GET result: OK Feb 12 21:56:37.400430 ignition[1257]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 21:56:37.403129 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 21:56:37.403129 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 21:56:37.403129 ignition[1257]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 21:56:37.768995 ignition[1257]: INFO : GET result: OK Feb 12 21:56:37.872640 ignition[1257]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 21:56:37.875849 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 21:56:37.875849 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 21:56:37.882591 ignition[1257]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 21:56:37.890980 ignition[1257]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1372917539" Feb 12 21:56:37.892654 ignition[1257]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1372917539": device or resource busy Feb 12 21:56:37.892654 ignition[1257]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1372917539", trying btrfs: device or resource busy Feb 12 21:56:37.892654 ignition[1257]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1372917539" Feb 12 21:56:37.901619 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1262) Feb 12 21:56:37.901653 ignition[1257]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1372917539" Feb 12 21:56:37.901653 ignition[1257]: INFO : op(3): [started] unmounting "/mnt/oem1372917539" Feb 12 21:56:37.901653 ignition[1257]: INFO : op(3): [finished] unmounting "/mnt/oem1372917539" Feb 12 21:56:37.901653 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 21:56:37.901653 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 21:56:37.901653 ignition[1257]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 12 21:56:38.036356 ignition[1257]: INFO : GET result: OK Feb 12 21:56:38.311601 ignition[1257]: DEBUG : file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 12 21:56:38.315068 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 21:56:38.315068 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 21:56:38.315068 ignition[1257]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 12 21:56:38.377367 ignition[1257]: INFO : GET result: OK Feb 12 21:56:38.925784 ignition[1257]: DEBUG : file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 12 21:56:38.928901 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 21:56:38.928901 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/install.sh" Feb 12 21:56:38.928901 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 21:56:38.928901 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 21:56:38.928901 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 21:56:38.942415 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 21:56:38.942415 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 21:56:38.959574 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 21:56:38.962987 ignition[1257]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 21:56:38.972027 ignition[1257]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1868548349" Feb 12 21:56:38.974331 ignition[1257]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1868548349": device or resource busy Feb 12 21:56:38.974331 ignition[1257]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1868548349", trying btrfs: device or resource busy Feb 12 21:56:38.974331 ignition[1257]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1868548349" Feb 12 21:56:38.982789 ignition[1257]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1868548349" Feb 12 21:56:38.982789 ignition[1257]: INFO : op(6): [started] unmounting "/mnt/oem1868548349" Feb 12 21:56:38.982789 ignition[1257]: INFO : op(6): [finished] unmounting "/mnt/oem1868548349" Feb 12 21:56:38.982789 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 21:56:38.982789 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 21:56:38.982789 ignition[1257]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 21:56:39.013168 ignition[1257]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1659743168" Feb 12 21:56:39.017467 ignition[1257]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1659743168": device or resource busy Feb 12 21:56:39.017467 ignition[1257]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1659743168", trying btrfs: device or resource busy Feb 12 21:56:39.017467 ignition[1257]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1659743168" Feb 12 21:56:39.017467 ignition[1257]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1659743168" Feb 12 21:56:39.017467 ignition[1257]: INFO : op(9): [started] unmounting "/mnt/oem1659743168" Feb 12 21:56:39.017467 ignition[1257]: INFO : op(9): [finished] unmounting "/mnt/oem1659743168" Feb 12 21:56:39.017467 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 21:56:39.017467 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 21:56:39.017467 ignition[1257]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 21:56:39.028013 systemd[1]: mnt-oem1659743168.mount: Deactivated successfully. Feb 12 21:56:39.058017 ignition[1257]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1884614095" Feb 12 21:56:39.060138 ignition[1257]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1884614095": device or resource busy Feb 12 21:56:39.060138 ignition[1257]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1884614095", trying btrfs: device or resource busy Feb 12 21:56:39.060138 ignition[1257]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1884614095" Feb 12 21:56:39.066360 ignition[1257]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1884614095" Feb 12 21:56:39.066360 ignition[1257]: INFO : op(c): [started] unmounting "/mnt/oem1884614095" Feb 12 21:56:39.066360 ignition[1257]: INFO : op(c): [finished] unmounting "/mnt/oem1884614095" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(e): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(e): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(f): [started] processing unit "amazon-ssm-agent.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(f): op(10): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(f): op(10): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(f): [finished] processing unit "amazon-ssm-agent.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(11): [started] processing unit "nvidia.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(11): [finished] processing unit "nvidia.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(12): [started] processing unit "prepare-cni-plugins.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(12): op(13): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(12): op(13): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(12): [finished] processing unit "prepare-cni-plugins.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(14): [started] processing unit "prepare-critools.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(14): op(15): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(14): op(15): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 21:56:39.066360 ignition[1257]: INFO : files: op(14): [finished] processing unit "prepare-critools.service" Feb 12 21:56:39.132922 ignition[1257]: INFO : files: op(16): [started] setting preset to enabled for "nvidia.service" Feb 12 21:56:39.132922 ignition[1257]: INFO : files: op(16): [finished] setting preset to enabled for "nvidia.service" Feb 12 21:56:39.132922 ignition[1257]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 21:56:39.132922 ignition[1257]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 21:56:39.132922 ignition[1257]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Feb 12 21:56:39.132922 ignition[1257]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 21:56:39.132922 ignition[1257]: INFO : files: op(19): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 21:56:39.132922 ignition[1257]: INFO : files: op(19): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 21:56:39.132922 ignition[1257]: INFO : files: op(1a): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 21:56:39.132922 ignition[1257]: INFO : files: op(1a): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 21:56:39.162606 ignition[1257]: INFO : files: createResultFile: createFiles: op(1b): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 21:56:39.164789 ignition[1257]: INFO : files: createResultFile: createFiles: op(1b): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 21:56:39.164789 ignition[1257]: INFO : files: files passed Feb 12 21:56:39.164789 ignition[1257]: INFO : Ignition finished successfully Feb 12 21:56:39.170120 systemd[1]: Finished ignition-files.service. Feb 12 21:56:39.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.176509 kernel: audit: type=1130 audit(1707774999.171:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.178376 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 21:56:39.181078 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 21:56:39.182384 systemd[1]: Starting ignition-quench.service... Feb 12 21:56:39.186882 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 21:56:39.187038 systemd[1]: Finished ignition-quench.service. Feb 12 21:56:39.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.200625 kernel: audit: type=1130 audit(1707774999.192:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.200680 kernel: audit: type=1131 audit(1707774999.192:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.206200 initrd-setup-root-after-ignition[1282]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 21:56:39.208873 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 21:56:39.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.211404 systemd[1]: Reached target ignition-complete.target. Feb 12 21:56:39.219513 kernel: audit: type=1130 audit(1707774999.210:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.221443 systemd[1]: Starting initrd-parse-etc.service... Feb 12 21:56:39.237553 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 21:56:39.237647 systemd[1]: Finished initrd-parse-etc.service. Feb 12 21:56:39.254586 kernel: audit: type=1130 audit(1707774999.239:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.254617 kernel: audit: type=1131 audit(1707774999.239:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.240131 systemd[1]: Reached target initrd-fs.target. Feb 12 21:56:39.256871 systemd[1]: Reached target initrd.target. Feb 12 21:56:39.258767 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 21:56:39.261377 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 21:56:39.279327 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 21:56:39.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.296302 kernel: audit: type=1130 audit(1707774999.285:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.287083 systemd[1]: Starting initrd-cleanup.service... Feb 12 21:56:39.307456 systemd[1]: Stopped target nss-lookup.target. Feb 12 21:56:39.309313 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 21:56:39.311962 systemd[1]: Stopped target timers.target. Feb 12 21:56:39.315121 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 21:56:39.316518 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 21:56:39.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.322830 systemd[1]: Stopped target initrd.target. Feb 12 21:56:39.326497 systemd[1]: Stopped target basic.target. Feb 12 21:56:39.328416 systemd[1]: Stopped target ignition-complete.target. Feb 12 21:56:39.329954 systemd[1]: Stopped target ignition-diskful.target. Feb 12 21:56:39.331354 systemd[1]: Stopped target initrd-root-device.target. Feb 12 21:56:39.333796 systemd[1]: Stopped target remote-fs.target. Feb 12 21:56:39.337024 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 21:56:39.338572 systemd[1]: Stopped target sysinit.target. Feb 12 21:56:39.342371 systemd[1]: Stopped target local-fs.target. Feb 12 21:56:39.344917 systemd[1]: Stopped target local-fs-pre.target. Feb 12 21:56:39.346986 systemd[1]: Stopped target swap.target. Feb 12 21:56:39.348574 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 21:56:39.349716 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 21:56:39.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.352227 systemd[1]: Stopped target cryptsetup.target. Feb 12 21:56:39.353901 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 21:56:39.355285 systemd[1]: Stopped dracut-initqueue.service. Feb 12 21:56:39.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.357140 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 21:56:39.358578 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 21:56:39.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.361816 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 21:56:39.364116 systemd[1]: Stopped ignition-files.service. Feb 12 21:56:39.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.375403 systemd[1]: Stopping ignition-mount.service... Feb 12 21:56:39.412332 ignition[1295]: INFO : Ignition 2.14.0 Feb 12 21:56:39.412332 ignition[1295]: INFO : Stage: umount Feb 12 21:56:39.412332 ignition[1295]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:56:39.412332 ignition[1295]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:56:39.382637 systemd[1]: Stopping iscsiuio.service... Feb 12 21:56:39.425802 systemd[1]: Stopping sysroot-boot.service... Feb 12 21:56:39.429976 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 21:56:39.431690 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 21:56:39.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.434360 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 21:56:39.436274 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 21:56:39.438868 ignition[1295]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:56:39.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.440832 ignition[1295]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:56:39.442639 ignition[1295]: INFO : PUT result: OK Feb 12 21:56:39.446369 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 21:56:39.448352 ignition[1295]: INFO : umount: umount passed Feb 12 21:56:39.448352 ignition[1295]: INFO : Ignition finished successfully Feb 12 21:56:39.448371 systemd[1]: Stopped iscsiuio.service. Feb 12 21:56:39.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.454332 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 21:56:39.454447 systemd[1]: Stopped ignition-mount.service. Feb 12 21:56:39.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.460151 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 21:56:39.461433 systemd[1]: Finished initrd-cleanup.service. Feb 12 21:56:39.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.464966 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 21:56:39.466184 systemd[1]: Stopped sysroot-boot.service. Feb 12 21:56:39.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.470204 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 21:56:39.470349 systemd[1]: Stopped ignition-disks.service. Feb 12 21:56:39.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.473350 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 21:56:39.474671 systemd[1]: Stopped ignition-kargs.service. Feb 12 21:56:39.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.476484 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 21:56:39.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.476552 systemd[1]: Stopped ignition-fetch.service. Feb 12 21:56:39.477652 systemd[1]: Stopped target network.target. Feb 12 21:56:39.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.479866 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 21:56:39.479930 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 21:56:39.481867 systemd[1]: Stopped target paths.target. Feb 12 21:56:39.483798 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 21:56:39.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.485534 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 21:56:39.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.487958 systemd[1]: Stopped target slices.target. Feb 12 21:56:39.488983 systemd[1]: Stopped target sockets.target. Feb 12 21:56:39.489075 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 21:56:39.489104 systemd[1]: Closed iscsid.socket. Feb 12 21:56:39.492833 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 21:56:39.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.492874 systemd[1]: Closed iscsiuio.socket. Feb 12 21:56:39.495121 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 21:56:39.495173 systemd[1]: Stopped ignition-setup.service. Feb 12 21:56:39.498849 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 21:56:39.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.498899 systemd[1]: Stopped initrd-setup-root.service. Feb 12 21:56:39.520000 audit: BPF prog-id=6 op=UNLOAD Feb 12 21:56:39.502940 systemd[1]: Stopping systemd-networkd.service... Feb 12 21:56:39.506657 systemd[1]: Stopping systemd-resolved.service... Feb 12 21:56:39.512545 systemd-networkd[1099]: eth0: DHCPv6 lease lost Feb 12 21:56:39.526000 audit: BPF prog-id=9 op=UNLOAD Feb 12 21:56:39.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.514289 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 21:56:39.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.514439 systemd[1]: Stopped systemd-resolved.service. Feb 12 21:56:39.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.518190 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 21:56:39.518340 systemd[1]: Stopped systemd-networkd.service. Feb 12 21:56:39.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.521515 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 21:56:39.521562 systemd[1]: Closed systemd-networkd.socket. Feb 12 21:56:39.525375 systemd[1]: Stopping network-cleanup.service... Feb 12 21:56:39.528667 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 21:56:39.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.528734 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 21:56:39.531861 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 21:56:39.531939 systemd[1]: Stopped systemd-sysctl.service. Feb 12 21:56:39.534463 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 21:56:39.534566 systemd[1]: Stopped systemd-modules-load.service. Feb 12 21:56:39.538086 systemd[1]: Stopping systemd-udevd.service... Feb 12 21:56:39.547364 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 21:56:39.547475 systemd[1]: Stopped network-cleanup.service. Feb 12 21:56:39.556923 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 21:56:39.557051 systemd[1]: Stopped systemd-udevd.service. Feb 12 21:56:39.575788 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 21:56:39.575854 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 21:56:39.579322 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 21:56:39.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.580259 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 21:56:39.582721 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 21:56:39.582784 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 21:56:39.587687 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 21:56:39.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.589137 systemd[1]: Stopped dracut-cmdline.service. Feb 12 21:56:39.592528 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 21:56:39.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.592581 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 21:56:39.597924 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 21:56:39.599182 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 21:56:39.599306 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 21:56:39.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.604294 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 21:56:39.604340 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 21:56:39.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.605570 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 21:56:39.605611 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 21:56:39.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.626594 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 21:56:39.628455 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 21:56:39.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:39.629980 systemd[1]: Reached target initrd-switch-root.target. Feb 12 21:56:39.634877 systemd[1]: Starting initrd-switch-root.service... Feb 12 21:56:39.654974 systemd[1]: Switching root. Feb 12 21:56:39.679695 iscsid[1106]: iscsid shutting down. Feb 12 21:56:39.681296 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Feb 12 21:56:39.681387 systemd-journald[185]: Journal stopped Feb 12 21:56:45.236166 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 21:56:45.236252 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 21:56:45.236271 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 21:56:45.236305 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 21:56:45.236327 kernel: SELinux: policy capability open_perms=1 Feb 12 21:56:45.236344 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 21:56:45.236362 kernel: SELinux: policy capability always_check_network=0 Feb 12 21:56:45.236388 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 21:56:45.236406 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 21:56:45.236424 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 21:56:45.236443 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 21:56:45.236466 systemd[1]: Successfully loaded SELinux policy in 107.623ms. Feb 12 21:56:45.236509 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.868ms. Feb 12 21:56:45.236529 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 21:56:45.236548 systemd[1]: Detected virtualization amazon. Feb 12 21:56:45.236567 systemd[1]: Detected architecture x86-64. Feb 12 21:56:45.236585 systemd[1]: Detected first boot. Feb 12 21:56:45.236606 systemd[1]: Initializing machine ID from VM UUID. Feb 12 21:56:45.236626 kernel: kauditd_printk_skb: 36 callbacks suppressed Feb 12 21:56:45.236751 kernel: audit: type=1400 audit(1707775000.608:78): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 21:56:45.236774 kernel: audit: type=1400 audit(1707775000.608:79): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 21:56:45.236792 kernel: audit: type=1334 audit(1707775000.617:80): prog-id=10 op=LOAD Feb 12 21:56:45.236809 kernel: audit: type=1334 audit(1707775000.617:81): prog-id=10 op=UNLOAD Feb 12 21:56:45.236827 kernel: audit: type=1334 audit(1707775000.621:82): prog-id=11 op=LOAD Feb 12 21:56:45.236848 kernel: audit: type=1334 audit(1707775000.621:83): prog-id=11 op=UNLOAD Feb 12 21:56:45.236866 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 21:56:45.236884 kernel: audit: type=1400 audit(1707775000.870:84): avc: denied { associate } for pid=1328 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 21:56:45.236905 kernel: audit: type=1300 audit(1707775000.870:84): arch=c000003e syscall=188 success=yes exit=0 a0=c0001058dc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=1311 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:45.236924 kernel: audit: type=1327 audit(1707775000.870:84): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 21:56:45.236942 kernel: audit: type=1400 audit(1707775000.873:85): avc: denied { associate } for pid=1328 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 21:56:45.236959 systemd[1]: Populated /etc with preset unit settings. Feb 12 21:56:45.236981 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 21:56:45.237000 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 21:56:45.237020 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 21:56:45.237038 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 21:56:45.237056 systemd[1]: Stopped iscsid.service. Feb 12 21:56:45.237075 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 21:56:45.237129 systemd[1]: Stopped initrd-switch-root.service. Feb 12 21:56:45.237160 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 21:56:45.237181 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 21:56:45.237200 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 21:56:45.237220 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 21:56:45.237238 systemd[1]: Created slice system-getty.slice. Feb 12 21:56:45.237258 systemd[1]: Created slice system-modprobe.slice. Feb 12 21:56:45.237277 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 21:56:45.237299 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 21:56:45.237320 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 21:56:45.237338 systemd[1]: Created slice user.slice. Feb 12 21:56:45.237359 systemd[1]: Started systemd-ask-password-console.path. Feb 12 21:56:45.237377 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 21:56:45.237396 systemd[1]: Set up automount boot.automount. Feb 12 21:56:45.237414 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 21:56:45.237433 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 21:56:45.237451 systemd[1]: Stopped target initrd-fs.target. Feb 12 21:56:45.237469 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 21:56:45.237501 systemd[1]: Reached target integritysetup.target. Feb 12 21:56:45.237520 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 21:56:45.237538 systemd[1]: Reached target remote-fs.target. Feb 12 21:56:45.237557 systemd[1]: Reached target slices.target. Feb 12 21:56:45.237622 systemd[1]: Reached target swap.target. Feb 12 21:56:45.237643 systemd[1]: Reached target torcx.target. Feb 12 21:56:45.237664 systemd[1]: Reached target veritysetup.target. Feb 12 21:56:45.237683 systemd[1]: Listening on systemd-coredump.socket. Feb 12 21:56:45.237703 systemd[1]: Listening on systemd-initctl.socket. Feb 12 21:56:45.237727 systemd[1]: Listening on systemd-networkd.socket. Feb 12 21:56:45.237747 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 21:56:45.237768 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 21:56:45.237785 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 21:56:45.237804 systemd[1]: Mounting dev-hugepages.mount... Feb 12 21:56:45.239863 systemd[1]: Mounting dev-mqueue.mount... Feb 12 21:56:45.239892 systemd[1]: Mounting media.mount... Feb 12 21:56:45.239912 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 21:56:45.239932 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 21:56:45.239953 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 21:56:45.239977 systemd[1]: Mounting tmp.mount... Feb 12 21:56:45.239997 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 21:56:45.240016 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 21:56:45.240036 systemd[1]: Starting kmod-static-nodes.service... Feb 12 21:56:45.240057 systemd[1]: Starting modprobe@configfs.service... Feb 12 21:56:45.240078 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 21:56:45.240100 systemd[1]: Starting modprobe@drm.service... Feb 12 21:56:45.240132 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 21:56:45.240155 systemd[1]: Starting modprobe@fuse.service... Feb 12 21:56:45.240177 systemd[1]: Starting modprobe@loop.service... Feb 12 21:56:45.240199 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 21:56:45.240301 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 21:56:45.240323 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 21:56:45.240347 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 21:56:45.240368 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 21:56:45.240390 systemd[1]: Stopped systemd-journald.service. Feb 12 21:56:45.240415 systemd[1]: Starting systemd-journald.service... Feb 12 21:56:45.240438 systemd[1]: Starting systemd-modules-load.service... Feb 12 21:56:45.240462 systemd[1]: Starting systemd-network-generator.service... Feb 12 21:56:45.240483 systemd[1]: Starting systemd-remount-fs.service... Feb 12 21:56:45.240556 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 21:56:45.240575 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 21:56:45.240596 systemd[1]: Stopped verity-setup.service. Feb 12 21:56:45.240615 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 21:56:45.240634 systemd[1]: Mounted dev-hugepages.mount. Feb 12 21:56:45.240652 systemd[1]: Mounted dev-mqueue.mount. Feb 12 21:56:45.242419 systemd[1]: Mounted media.mount. Feb 12 21:56:45.242537 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 21:56:45.242560 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 21:56:45.242580 systemd[1]: Mounted tmp.mount. Feb 12 21:56:45.242600 systemd[1]: Finished kmod-static-nodes.service. Feb 12 21:56:45.242619 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 21:56:45.242643 systemd[1]: Finished modprobe@configfs.service. Feb 12 21:56:45.242662 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 21:56:45.242682 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 21:56:45.242700 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 21:56:45.242722 systemd[1]: Finished modprobe@drm.service. Feb 12 21:56:45.242740 kernel: fuse: init (API version 7.34) Feb 12 21:56:45.242761 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 21:56:45.242785 systemd-journald[1404]: Journal started Feb 12 21:56:45.242858 systemd-journald[1404]: Runtime Journal (/run/log/journal/ec2c0169e349ef22b4afc3a48ebe2f62) is 4.8M, max 38.7M, 33.9M free. Feb 12 21:56:40.443000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 21:56:40.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 21:56:40.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 21:56:40.617000 audit: BPF prog-id=10 op=LOAD Feb 12 21:56:40.617000 audit: BPF prog-id=10 op=UNLOAD Feb 12 21:56:40.621000 audit: BPF prog-id=11 op=LOAD Feb 12 21:56:40.621000 audit: BPF prog-id=11 op=UNLOAD Feb 12 21:56:40.870000 audit[1328]: AVC avc: denied { associate } for pid=1328 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 21:56:40.870000 audit[1328]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058dc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=1311 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:40.870000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 21:56:40.873000 audit[1328]: AVC avc: denied { associate } for pid=1328 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 21:56:40.873000 audit[1328]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059b5 a2=1ed a3=0 items=2 ppid=1311 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:40.873000 audit: CWD cwd="/" Feb 12 21:56:40.873000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:40.873000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:40.873000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 21:56:44.924000 audit: BPF prog-id=12 op=LOAD Feb 12 21:56:44.925000 audit: BPF prog-id=3 op=UNLOAD Feb 12 21:56:44.926000 audit: BPF prog-id=13 op=LOAD Feb 12 21:56:44.926000 audit: BPF prog-id=14 op=LOAD Feb 12 21:56:44.926000 audit: BPF prog-id=4 op=UNLOAD Feb 12 21:56:44.926000 audit: BPF prog-id=5 op=UNLOAD Feb 12 21:56:44.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:44.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:44.932000 audit: BPF prog-id=12 op=UNLOAD Feb 12 21:56:44.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:44.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.256257 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 21:56:45.256368 systemd[1]: Started systemd-journald.service. Feb 12 21:56:45.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.141000 audit: BPF prog-id=15 op=LOAD Feb 12 21:56:45.142000 audit: BPF prog-id=16 op=LOAD Feb 12 21:56:45.142000 audit: BPF prog-id=17 op=LOAD Feb 12 21:56:45.142000 audit: BPF prog-id=13 op=UNLOAD Feb 12 21:56:45.142000 audit: BPF prog-id=14 op=UNLOAD Feb 12 21:56:45.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.232000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 21:56:45.232000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe3f1a22d0 a2=4000 a3=7ffe3f1a236c items=0 ppid=1 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:45.232000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 21:56:45.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:40.859509 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 21:56:44.922437 systemd[1]: Queued start job for default target multi-user.target. Feb 12 21:56:45.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:40.860053 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 21:56:44.927683 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 21:56:40.860082 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 21:56:45.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.251909 systemd[1]: Finished systemd-network-generator.service. Feb 12 21:56:40.860116 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 21:56:45.254650 systemd[1]: Finished systemd-remount-fs.service. Feb 12 21:56:40.860126 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 21:56:45.256145 systemd[1]: Reached target network-pre.target. Feb 12 21:56:40.860156 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 21:56:45.259049 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 21:56:40.860169 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 21:56:45.259994 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 21:56:40.860449 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 21:56:45.262197 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 21:56:40.860555 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 21:56:45.264653 systemd[1]: Starting systemd-journal-flush.service... Feb 12 21:56:40.860579 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 21:56:45.265996 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 21:56:40.869940 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 21:56:45.270816 systemd[1]: Starting systemd-random-seed.service... Feb 12 21:56:40.870004 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 21:56:45.273773 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 21:56:40.870026 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 21:56:45.273993 systemd[1]: Finished modprobe@fuse.service. Feb 12 21:56:40.870041 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 21:56:45.275941 systemd[1]: Finished systemd-modules-load.service. Feb 12 21:56:40.870060 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 21:56:45.277261 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 21:56:40.870074 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 21:56:45.280344 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 21:56:44.332296 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:44Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:56:45.286548 systemd[1]: Starting systemd-sysctl.service... Feb 12 21:56:45.300764 kernel: loop: module loaded Feb 12 21:56:44.332571 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:44Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:56:45.289334 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 21:56:45.302607 systemd-journald[1404]: Time spent on flushing to /var/log/journal/ec2c0169e349ef22b4afc3a48ebe2f62 is 88.649ms for 1182 entries. Feb 12 21:56:45.302607 systemd-journald[1404]: System Journal (/var/log/journal/ec2c0169e349ef22b4afc3a48ebe2f62) is 8.0M, max 195.6M, 187.6M free. Feb 12 21:56:45.416075 systemd-journald[1404]: Received client request to flush runtime journal. Feb 12 21:56:45.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:44.332687 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:44Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:56:45.307652 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 21:56:44.333174 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:44Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:56:45.307838 systemd[1]: Finished modprobe@loop.service. Feb 12 21:56:44.333228 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:44Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 21:56:45.309748 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 21:56:45.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:44.333286 /usr/lib/systemd/system-generators/torcx-generator[1328]: time="2024-02-12T21:56:44Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 21:56:45.313195 systemd[1]: Finished systemd-random-seed.service. Feb 12 21:56:45.314710 systemd[1]: Reached target first-boot-complete.target. Feb 12 21:56:45.345434 systemd[1]: Finished systemd-sysctl.service. Feb 12 21:56:45.417355 systemd[1]: Finished systemd-journal-flush.service. Feb 12 21:56:45.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.433653 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 21:56:45.437694 systemd[1]: Starting systemd-sysusers.service... Feb 12 21:56:45.445983 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 21:56:45.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.449609 systemd[1]: Starting systemd-udev-settle.service... Feb 12 21:56:45.463729 udevadm[1444]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 21:56:45.592797 systemd[1]: Finished systemd-sysusers.service. Feb 12 21:56:45.595943 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 21:56:45.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.665979 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 21:56:45.673746 kernel: kauditd_printk_skb: 52 callbacks suppressed Feb 12 21:56:45.673852 kernel: audit: type=1130 audit(1707775005.666:131): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:45.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.110604 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 21:56:46.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.113641 systemd[1]: Starting systemd-udevd.service... Feb 12 21:56:46.122190 kernel: audit: type=1130 audit(1707775006.111:132): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.122281 kernel: audit: type=1334 audit(1707775006.111:133): prog-id=18 op=LOAD Feb 12 21:56:46.122299 kernel: audit: type=1334 audit(1707775006.112:134): prog-id=19 op=LOAD Feb 12 21:56:46.122316 kernel: audit: type=1334 audit(1707775006.112:135): prog-id=7 op=UNLOAD Feb 12 21:56:46.111000 audit: BPF prog-id=18 op=LOAD Feb 12 21:56:46.112000 audit: BPF prog-id=19 op=LOAD Feb 12 21:56:46.112000 audit: BPF prog-id=7 op=UNLOAD Feb 12 21:56:46.125593 kernel: audit: type=1334 audit(1707775006.112:136): prog-id=8 op=UNLOAD Feb 12 21:56:46.112000 audit: BPF prog-id=8 op=UNLOAD Feb 12 21:56:46.151031 systemd-udevd[1447]: Using default interface naming scheme 'v252'. Feb 12 21:56:46.206781 systemd[1]: Started systemd-udevd.service. Feb 12 21:56:46.219394 kernel: audit: type=1130 audit(1707775006.207:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.219522 kernel: audit: type=1334 audit(1707775006.208:138): prog-id=20 op=LOAD Feb 12 21:56:46.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.208000 audit: BPF prog-id=20 op=LOAD Feb 12 21:56:46.210409 systemd[1]: Starting systemd-networkd.service... Feb 12 21:56:46.242265 kernel: audit: type=1334 audit(1707775006.234:139): prog-id=21 op=LOAD Feb 12 21:56:46.242360 kernel: audit: type=1334 audit(1707775006.234:140): prog-id=22 op=LOAD Feb 12 21:56:46.234000 audit: BPF prog-id=21 op=LOAD Feb 12 21:56:46.234000 audit: BPF prog-id=22 op=LOAD Feb 12 21:56:46.235000 audit: BPF prog-id=23 op=LOAD Feb 12 21:56:46.236600 systemd[1]: Starting systemd-userdbd.service... Feb 12 21:56:46.278372 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 21:56:46.306412 systemd[1]: Started systemd-userdbd.service. Feb 12 21:56:46.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.313894 (udev-worker)[1462]: Network interface NamePolicy= disabled on kernel command line. Feb 12 21:56:46.449530 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 21:56:46.477638 kernel: ACPI: button: Power Button [PWRF] Feb 12 21:56:46.458000 audit[1458]: AVC avc: denied { confidentiality } for pid=1458 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 21:56:46.458000 audit[1458]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a3441f0090 a1=32194 a2=7f6013950bc5 a3=5 items=108 ppid=1447 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:46.481942 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 12 21:56:46.481995 kernel: ACPI: button: Sleep Button [SLPF] Feb 12 21:56:46.458000 audit: CWD cwd="/" Feb 12 21:56:46.458000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=1 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=2 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=3 name=(null) inode=14804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=4 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=5 name=(null) inode=14805 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=6 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=7 name=(null) inode=14806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=8 name=(null) inode=14806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=9 name=(null) inode=14807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=10 name=(null) inode=14806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=11 name=(null) inode=14808 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=12 name=(null) inode=14806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=13 name=(null) inode=14809 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=14 name=(null) inode=14806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=15 name=(null) inode=14810 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=16 name=(null) inode=14806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=17 name=(null) inode=14811 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=18 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=19 name=(null) inode=14812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=20 name=(null) inode=14812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=21 name=(null) inode=14813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=22 name=(null) inode=14812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=23 name=(null) inode=14814 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=24 name=(null) inode=14812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=25 name=(null) inode=14815 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=26 name=(null) inode=14812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=27 name=(null) inode=14816 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=28 name=(null) inode=14812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=29 name=(null) inode=14817 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=30 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=31 name=(null) inode=14818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=32 name=(null) inode=14818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=33 name=(null) inode=14819 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=34 name=(null) inode=14818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=35 name=(null) inode=14820 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=36 name=(null) inode=14818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=37 name=(null) inode=14821 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=38 name=(null) inode=14818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=39 name=(null) inode=14822 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=40 name=(null) inode=14818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=41 name=(null) inode=14823 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=42 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=43 name=(null) inode=14824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=44 name=(null) inode=14824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=45 name=(null) inode=14825 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=46 name=(null) inode=14824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=47 name=(null) inode=14826 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=48 name=(null) inode=14824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=49 name=(null) inode=14827 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=50 name=(null) inode=14824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=51 name=(null) inode=14828 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=52 name=(null) inode=14824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=53 name=(null) inode=14829 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=55 name=(null) inode=14830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=56 name=(null) inode=14830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=57 name=(null) inode=14831 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=58 name=(null) inode=14830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=59 name=(null) inode=14832 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=60 name=(null) inode=14830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=61 name=(null) inode=14833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=62 name=(null) inode=14833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=63 name=(null) inode=14834 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=64 name=(null) inode=14833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=65 name=(null) inode=14835 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=66 name=(null) inode=14833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=67 name=(null) inode=14836 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=68 name=(null) inode=14833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=69 name=(null) inode=14837 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=70 name=(null) inode=14833 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=71 name=(null) inode=14838 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=72 name=(null) inode=14830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=73 name=(null) inode=14839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=74 name=(null) inode=14839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=75 name=(null) inode=14840 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=76 name=(null) inode=14839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=77 name=(null) inode=14841 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=78 name=(null) inode=14839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=79 name=(null) inode=14842 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=80 name=(null) inode=14839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=81 name=(null) inode=14843 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=82 name=(null) inode=14839 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=83 name=(null) inode=14844 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=84 name=(null) inode=14830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=85 name=(null) inode=14845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=86 name=(null) inode=14845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=87 name=(null) inode=14846 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=88 name=(null) inode=14845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=89 name=(null) inode=14847 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=90 name=(null) inode=14845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=91 name=(null) inode=14848 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=92 name=(null) inode=14845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=93 name=(null) inode=14849 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=94 name=(null) inode=14845 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=95 name=(null) inode=14850 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=96 name=(null) inode=14830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=97 name=(null) inode=14851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=98 name=(null) inode=14851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=99 name=(null) inode=14852 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=100 name=(null) inode=14851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=101 name=(null) inode=14853 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=102 name=(null) inode=14851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=103 name=(null) inode=14854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=104 name=(null) inode=14851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=105 name=(null) inode=14855 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=106 name=(null) inode=14851 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PATH item=107 name=(null) inode=14856 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:56:46.458000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 21:56:46.499271 systemd-networkd[1456]: lo: Link UP Feb 12 21:56:46.499388 systemd-networkd[1456]: lo: Gained carrier Feb 12 21:56:46.500164 systemd-networkd[1456]: Enumeration completed Feb 12 21:56:46.500279 systemd[1]: Started systemd-networkd.service. Feb 12 21:56:46.504727 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 21:56:46.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.507604 systemd-networkd[1456]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 21:56:46.519832 systemd-networkd[1456]: eth0: Link UP Feb 12 21:56:46.521511 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 21:56:46.521553 systemd-networkd[1456]: eth0: Gained carrier Feb 12 21:56:46.526640 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Feb 12 21:56:46.535887 systemd-networkd[1456]: eth0: DHCPv4 address 172.31.16.216/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 21:56:46.536515 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Feb 12 21:56:46.551509 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 21:56:46.582654 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1448) Feb 12 21:56:46.723085 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 21:56:46.781059 systemd[1]: Finished systemd-udev-settle.service. Feb 12 21:56:46.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.783690 systemd[1]: Starting lvm2-activation-early.service... Feb 12 21:56:46.829379 lvm[1561]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 21:56:46.860848 systemd[1]: Finished lvm2-activation-early.service. Feb 12 21:56:46.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.863178 systemd[1]: Reached target cryptsetup.target. Feb 12 21:56:46.865892 systemd[1]: Starting lvm2-activation.service... Feb 12 21:56:46.876968 lvm[1562]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 21:56:46.904270 systemd[1]: Finished lvm2-activation.service. Feb 12 21:56:46.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.905651 systemd[1]: Reached target local-fs-pre.target. Feb 12 21:56:46.907157 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 21:56:46.907194 systemd[1]: Reached target local-fs.target. Feb 12 21:56:46.908776 systemd[1]: Reached target machines.target. Feb 12 21:56:46.911664 systemd[1]: Starting ldconfig.service... Feb 12 21:56:46.913019 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 21:56:46.913100 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 21:56:46.914717 systemd[1]: Starting systemd-boot-update.service... Feb 12 21:56:46.919256 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 21:56:46.925677 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 21:56:46.927384 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 21:56:46.927504 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 21:56:46.929333 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 21:56:46.946866 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1564 (bootctl) Feb 12 21:56:46.949390 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 21:56:46.971079 systemd-tmpfiles[1567]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 21:56:46.976571 systemd-tmpfiles[1567]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 21:56:46.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:46.977553 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 21:56:46.980067 systemd-tmpfiles[1567]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 21:56:47.130044 systemd-fsck[1573]: fsck.fat 4.2 (2021-01-31) Feb 12 21:56:47.130044 systemd-fsck[1573]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters Feb 12 21:56:47.132319 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 21:56:47.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:47.135370 systemd[1]: Mounting boot.mount... Feb 12 21:56:47.156299 systemd[1]: Mounted boot.mount. Feb 12 21:56:47.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:47.188878 systemd[1]: Finished systemd-boot-update.service. Feb 12 21:56:47.264972 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 21:56:47.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:47.267426 systemd[1]: Starting audit-rules.service... Feb 12 21:56:47.269529 systemd[1]: Starting clean-ca-certificates.service... Feb 12 21:56:47.272284 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 21:56:47.274000 audit: BPF prog-id=24 op=LOAD Feb 12 21:56:47.277000 audit: BPF prog-id=25 op=LOAD Feb 12 21:56:47.275957 systemd[1]: Starting systemd-resolved.service... Feb 12 21:56:47.279283 systemd[1]: Starting systemd-timesyncd.service... Feb 12 21:56:47.282742 systemd[1]: Starting systemd-update-utmp.service... Feb 12 21:56:47.297000 audit[1592]: SYSTEM_BOOT pid=1592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 21:56:47.301261 systemd[1]: Finished clean-ca-certificates.service. Feb 12 21:56:47.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:47.302825 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 21:56:47.304240 systemd[1]: Finished systemd-update-utmp.service. Feb 12 21:56:47.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:47.355663 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 21:56:47.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:47.397414 systemd[1]: Started systemd-timesyncd.service. Feb 12 21:56:47.398700 systemd[1]: Reached target time-set.target. Feb 12 21:56:47.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:47.418982 systemd-resolved[1590]: Positive Trust Anchors: Feb 12 21:56:47.418997 systemd-resolved[1590]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 21:56:47.419037 systemd-resolved[1590]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 21:56:47.425000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 21:56:47.425000 audit[1608]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff7427dc50 a2=420 a3=0 items=0 ppid=1587 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:47.425000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 21:56:47.426502 augenrules[1608]: No rules Feb 12 21:56:47.427345 systemd[1]: Finished audit-rules.service. Feb 12 21:56:47.446230 systemd-resolved[1590]: Defaulting to hostname 'linux'. Feb 12 21:56:47.448449 systemd[1]: Started systemd-resolved.service. Feb 12 21:56:47.449736 systemd[1]: Reached target network.target. Feb 12 21:56:47.451290 systemd[1]: Reached target nss-lookup.target. Feb 12 21:56:48.519922 systemd-resolved[1590]: Clock change detected. Flushing caches. Feb 12 21:56:48.520281 systemd-timesyncd[1591]: Contacted time server 5.161.44.72:123 (0.flatcar.pool.ntp.org). Feb 12 21:56:48.520440 systemd-timesyncd[1591]: Initial clock synchronization to Mon 2024-02-12 21:56:48.519791 UTC. Feb 12 21:56:49.061925 ldconfig[1563]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 21:56:49.082559 systemd[1]: Finished ldconfig.service. Feb 12 21:56:49.085512 systemd[1]: Starting systemd-update-done.service... Feb 12 21:56:49.095234 systemd[1]: Finished systemd-update-done.service. Feb 12 21:56:49.096591 systemd[1]: Reached target sysinit.target. Feb 12 21:56:49.098375 systemd[1]: Started motdgen.path. Feb 12 21:56:49.099946 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 21:56:49.102309 systemd[1]: Started logrotate.timer. Feb 12 21:56:49.103643 systemd[1]: Started mdadm.timer. Feb 12 21:56:49.104856 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 21:56:49.106275 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 21:56:49.106320 systemd[1]: Reached target paths.target. Feb 12 21:56:49.108340 systemd[1]: Reached target timers.target. Feb 12 21:56:49.110082 systemd[1]: Listening on dbus.socket. Feb 12 21:56:49.113643 systemd[1]: Starting docker.socket... Feb 12 21:56:49.120434 systemd[1]: Listening on sshd.socket. Feb 12 21:56:49.121523 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 21:56:49.122188 systemd[1]: Listening on docker.socket. Feb 12 21:56:49.123135 systemd[1]: Reached target sockets.target. Feb 12 21:56:49.124047 systemd[1]: Reached target basic.target. Feb 12 21:56:49.125207 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 21:56:49.125233 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 21:56:49.126411 systemd[1]: Starting containerd.service... Feb 12 21:56:49.129759 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 21:56:49.132868 systemd[1]: Starting dbus.service... Feb 12 21:56:49.135978 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 21:56:49.138398 systemd[1]: Starting extend-filesystems.service... Feb 12 21:56:49.141068 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 21:56:49.142640 systemd[1]: Starting motdgen.service... Feb 12 21:56:49.146195 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 21:56:49.149917 systemd[1]: Starting prepare-critools.service... Feb 12 21:56:49.153617 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 21:56:49.156872 systemd[1]: Starting sshd-keygen.service... Feb 12 21:56:49.161594 systemd[1]: Starting systemd-logind.service... Feb 12 21:56:49.162677 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 21:56:49.162751 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 21:56:49.163361 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 21:56:49.166102 systemd[1]: Starting update-engine.service... Feb 12 21:56:49.169810 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 21:56:49.185342 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 21:56:49.263333 jq[1620]: false Feb 12 21:56:49.263450 jq[1629]: true Feb 12 21:56:49.190044 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 21:56:49.264826 tar[1633]: crictl Feb 12 21:56:49.196316 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 21:56:49.266565 tar[1634]: ./ Feb 12 21:56:49.266565 tar[1634]: ./loopback Feb 12 21:56:49.196513 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 21:56:49.201159 systemd-networkd[1456]: eth0: Gained IPv6LL Feb 12 21:56:49.210739 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 21:56:49.212852 systemd[1]: Reached target network-online.target. Feb 12 21:56:49.215643 systemd[1]: Started amazon-ssm-agent.service. Feb 12 21:56:49.219860 systemd[1]: Started nvidia.service. Feb 12 21:56:49.286194 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 21:56:49.286491 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 21:56:49.321241 jq[1646]: true Feb 12 21:56:49.429611 systemd[1]: Created slice system-sshd.slice. Feb 12 21:56:49.445348 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 21:56:49.445555 systemd[1]: Finished motdgen.service. Feb 12 21:56:49.460661 dbus-daemon[1619]: [system] SELinux support is enabled Feb 12 21:56:49.461230 systemd[1]: Started dbus.service. Feb 12 21:56:49.465278 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 21:56:49.465313 systemd[1]: Reached target system-config.target. Feb 12 21:56:49.466584 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 21:56:49.466616 systemd[1]: Reached target user-config.target. Feb 12 21:56:49.488120 dbus-daemon[1619]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1456 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 12 21:56:49.492969 dbus-daemon[1619]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 21:56:49.503765 extend-filesystems[1621]: Found nvme0n1 Feb 12 21:56:49.503765 extend-filesystems[1621]: Found nvme0n1p1 Feb 12 21:56:49.503765 extend-filesystems[1621]: Found nvme0n1p2 Feb 12 21:56:49.503765 extend-filesystems[1621]: Found nvme0n1p3 Feb 12 21:56:49.503765 extend-filesystems[1621]: Found usr Feb 12 21:56:49.503765 extend-filesystems[1621]: Found nvme0n1p4 Feb 12 21:56:49.503765 extend-filesystems[1621]: Found nvme0n1p6 Feb 12 21:56:49.503765 extend-filesystems[1621]: Found nvme0n1p7 Feb 12 21:56:49.503765 extend-filesystems[1621]: Found nvme0n1p9 Feb 12 21:56:49.503765 extend-filesystems[1621]: Checking size of /dev/nvme0n1p9 Feb 12 21:56:49.511272 systemd[1]: Starting systemd-hostnamed.service... Feb 12 21:56:49.566049 amazon-ssm-agent[1640]: 2024/02/12 21:56:49 Failed to load instance info from vault. RegistrationKey does not exist. Feb 12 21:56:49.569314 amazon-ssm-agent[1640]: Initializing new seelog logger Feb 12 21:56:49.573731 amazon-ssm-agent[1640]: New Seelog Logger Creation Complete Feb 12 21:56:49.573970 amazon-ssm-agent[1640]: 2024/02/12 21:56:49 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 21:56:49.574055 amazon-ssm-agent[1640]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 21:56:49.574338 amazon-ssm-agent[1640]: 2024/02/12 21:56:49 processing appconfig overrides Feb 12 21:56:49.586641 extend-filesystems[1621]: Resized partition /dev/nvme0n1p9 Feb 12 21:56:49.605709 extend-filesystems[1692]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 21:56:49.613488 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 12 21:56:49.617339 bash[1689]: Updated "/home/core/.ssh/authorized_keys" Feb 12 21:56:49.618292 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 21:56:49.627732 update_engine[1628]: I0212 21:56:49.626789 1628 main.cc:92] Flatcar Update Engine starting Feb 12 21:56:49.641614 systemd[1]: Started update-engine.service. Feb 12 21:56:49.643123 update_engine[1628]: I0212 21:56:49.641680 1628 update_check_scheduler.cc:74] Next update check in 2m20s Feb 12 21:56:49.645170 systemd[1]: Started locksmithd.service. Feb 12 21:56:49.662754 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 21:56:49.679449 env[1644]: time="2024-02-12T21:56:49.679380919Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 21:56:49.683473 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 12 21:56:49.724984 extend-filesystems[1692]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 12 21:56:49.724984 extend-filesystems[1692]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 21:56:49.724984 extend-filesystems[1692]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 12 21:56:49.742161 extend-filesystems[1621]: Resized filesystem in /dev/nvme0n1p9 Feb 12 21:56:49.727404 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 21:56:49.727604 systemd[1]: Finished extend-filesystems.service. Feb 12 21:56:49.746122 tar[1634]: ./bandwidth Feb 12 21:56:49.789141 systemd-logind[1627]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 21:56:49.794588 systemd-logind[1627]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 12 21:56:49.794831 systemd-logind[1627]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 21:56:49.798358 systemd-logind[1627]: New seat seat0. Feb 12 21:56:49.801301 systemd[1]: Started systemd-logind.service. Feb 12 21:56:49.866831 env[1644]: time="2024-02-12T21:56:49.866722465Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 21:56:49.874364 env[1644]: time="2024-02-12T21:56:49.874325681Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:56:49.880175 env[1644]: time="2024-02-12T21:56:49.880124280Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 21:56:49.880335 env[1644]: time="2024-02-12T21:56:49.880314503Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:56:49.880932 env[1644]: time="2024-02-12T21:56:49.880881676Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 21:56:49.881086 env[1644]: time="2024-02-12T21:56:49.881066452Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 21:56:49.881198 env[1644]: time="2024-02-12T21:56:49.881179689Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 21:56:49.881299 env[1644]: time="2024-02-12T21:56:49.881282006Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 21:56:49.881643 env[1644]: time="2024-02-12T21:56:49.881535377Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:56:49.882311 env[1644]: time="2024-02-12T21:56:49.882280138Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:56:49.891824 env[1644]: time="2024-02-12T21:56:49.891765358Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 21:56:49.900004 env[1644]: time="2024-02-12T21:56:49.899954750Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 21:56:49.900393 env[1644]: time="2024-02-12T21:56:49.900351374Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 21:56:49.900518 env[1644]: time="2024-02-12T21:56:49.900501309Z" level=info msg="metadata content store policy set" policy=shared Feb 12 21:56:49.908888 env[1644]: time="2024-02-12T21:56:49.908843889Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 21:56:49.909074 env[1644]: time="2024-02-12T21:56:49.909054672Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 21:56:49.909151 env[1644]: time="2024-02-12T21:56:49.909136370Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 21:56:49.909253 env[1644]: time="2024-02-12T21:56:49.909237501Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 21:56:49.909395 env[1644]: time="2024-02-12T21:56:49.909378615Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 21:56:49.909479 env[1644]: time="2024-02-12T21:56:49.909461851Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 21:56:49.909626 env[1644]: time="2024-02-12T21:56:49.909558439Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 21:56:49.909886 env[1644]: time="2024-02-12T21:56:49.909790629Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 21:56:49.910020 env[1644]: time="2024-02-12T21:56:49.910002625Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 21:56:49.910107 env[1644]: time="2024-02-12T21:56:49.910090686Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 21:56:49.910188 env[1644]: time="2024-02-12T21:56:49.910172131Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 21:56:49.910268 env[1644]: time="2024-02-12T21:56:49.910251823Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 21:56:49.910474 env[1644]: time="2024-02-12T21:56:49.910454255Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 21:56:49.910744 env[1644]: time="2024-02-12T21:56:49.910722405Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 21:56:49.911396 env[1644]: time="2024-02-12T21:56:49.911370300Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 21:56:49.911754 env[1644]: time="2024-02-12T21:56:49.911716529Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.911883 env[1644]: time="2024-02-12T21:56:49.911863401Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 21:56:49.912052 env[1644]: time="2024-02-12T21:56:49.912033093Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.912196 env[1644]: time="2024-02-12T21:56:49.912179886Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.912288 env[1644]: time="2024-02-12T21:56:49.912272483Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.912360 env[1644]: time="2024-02-12T21:56:49.912346708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.912433 env[1644]: time="2024-02-12T21:56:49.912419082Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.912508 env[1644]: time="2024-02-12T21:56:49.912494868Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.912577 env[1644]: time="2024-02-12T21:56:49.912563961Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.912649 env[1644]: time="2024-02-12T21:56:49.912634528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.912742 env[1644]: time="2024-02-12T21:56:49.912727485Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 21:56:49.913020 env[1644]: time="2024-02-12T21:56:49.912998628Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.913123 env[1644]: time="2024-02-12T21:56:49.913104927Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.913210 env[1644]: time="2024-02-12T21:56:49.913193749Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.913292 env[1644]: time="2024-02-12T21:56:49.913276744Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 21:56:49.913387 env[1644]: time="2024-02-12T21:56:49.913356960Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 21:56:49.913465 env[1644]: time="2024-02-12T21:56:49.913450878Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 21:56:49.913548 env[1644]: time="2024-02-12T21:56:49.913531828Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 21:56:49.913644 env[1644]: time="2024-02-12T21:56:49.913629577Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 21:56:49.914156 env[1644]: time="2024-02-12T21:56:49.914081790Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 21:56:49.916458 env[1644]: time="2024-02-12T21:56:49.914360510Z" level=info msg="Connect containerd service" Feb 12 21:56:49.916458 env[1644]: time="2024-02-12T21:56:49.914415268Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 21:56:49.918678 env[1644]: time="2024-02-12T21:56:49.918642648Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 21:56:49.947550 env[1644]: time="2024-02-12T21:56:49.947267603Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 21:56:49.951255 env[1644]: time="2024-02-12T21:56:49.950100476Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 21:56:49.951646 systemd[1]: Started containerd.service. Feb 12 21:56:49.954194 env[1644]: time="2024-02-12T21:56:49.954163636Z" level=info msg="containerd successfully booted in 0.283756s" Feb 12 21:56:49.958937 env[1644]: time="2024-02-12T21:56:49.958783656Z" level=info msg="Start subscribing containerd event" Feb 12 21:56:49.975945 env[1644]: time="2024-02-12T21:56:49.974846275Z" level=info msg="Start recovering state" Feb 12 21:56:49.976314 dbus-daemon[1619]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 12 21:56:49.977226 systemd[1]: Started systemd-hostnamed.service. Feb 12 21:56:49.985562 env[1644]: time="2024-02-12T21:56:49.985498062Z" level=info msg="Start event monitor" Feb 12 21:56:49.988421 dbus-daemon[1619]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1675 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 12 21:56:49.997354 systemd[1]: Starting polkit.service... Feb 12 21:56:50.001664 env[1644]: time="2024-02-12T21:56:50.001611088Z" level=info msg="Start snapshots syncer" Feb 12 21:56:50.001842 env[1644]: time="2024-02-12T21:56:50.001821085Z" level=info msg="Start cni network conf syncer for default" Feb 12 21:56:50.002125 env[1644]: time="2024-02-12T21:56:50.002091924Z" level=info msg="Start streaming server" Feb 12 21:56:50.042292 polkitd[1720]: Started polkitd version 121 Feb 12 21:56:50.068096 polkitd[1720]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 21:56:50.068180 polkitd[1720]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 21:56:50.071056 tar[1634]: ./ptp Feb 12 21:56:50.081644 polkitd[1720]: Finished loading, compiling and executing 2 rules Feb 12 21:56:50.082316 dbus-daemon[1619]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 21:56:50.082518 systemd[1]: Started polkit.service. Feb 12 21:56:50.084970 polkitd[1720]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 21:56:50.113136 systemd-hostnamed[1675]: Hostname set to (transient) Feb 12 21:56:50.113626 systemd-resolved[1590]: System hostname changed to 'ip-172-31-16-216'. Feb 12 21:56:50.249516 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Create new startup processor Feb 12 21:56:50.249896 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [LongRunningPluginsManager] registered plugins: {} Feb 12 21:56:50.250021 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Initializing bookkeeping folders Feb 12 21:56:50.250170 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO removing the completed state files Feb 12 21:56:50.250260 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Initializing bookkeeping folders for long running plugins Feb 12 21:56:50.250342 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 12 21:56:50.250428 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Initializing healthcheck folders for long running plugins Feb 12 21:56:50.250509 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Initializing locations for inventory plugin Feb 12 21:56:50.250599 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Initializing default location for custom inventory Feb 12 21:56:50.250681 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Initializing default location for file inventory Feb 12 21:56:50.250762 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Initializing default location for role inventory Feb 12 21:56:50.250843 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Init the cloudwatchlogs publisher Feb 12 21:56:50.250942 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 12 21:56:50.251029 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Successfully loaded platform independent plugin aws:refreshAssociation Feb 12 21:56:50.251108 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Successfully loaded platform independent plugin aws:runDocument Feb 12 21:56:50.251185 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Successfully loaded platform independent plugin aws:softwareInventory Feb 12 21:56:50.251259 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Successfully loaded platform independent plugin aws:configureDocker Feb 12 21:56:50.251496 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Successfully loaded platform independent plugin aws:runDockerAction Feb 12 21:56:50.251585 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Successfully loaded platform independent plugin aws:configurePackage Feb 12 21:56:50.251675 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Successfully loaded platform independent plugin aws:downloadContent Feb 12 21:56:50.251755 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 12 21:56:50.251836 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Successfully loaded platform dependent plugin aws:runShellScript Feb 12 21:56:50.251929 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 12 21:56:50.252241 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO OS: linux, Arch: amd64 Feb 12 21:56:50.262454 amazon-ssm-agent[1640]: datastore file /var/lib/amazon/ssm/i-0c37d015f66492e9f/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 12 21:56:50.275312 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessagingDeliveryService] Starting document processing engine... Feb 12 21:56:50.361927 tar[1634]: ./vlan Feb 12 21:56:50.371177 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 12 21:56:50.408911 coreos-metadata[1618]: Feb 12 21:56:50.408 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 12 21:56:50.411934 coreos-metadata[1618]: Feb 12 21:56:50.411 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 12 21:56:50.414373 coreos-metadata[1618]: Feb 12 21:56:50.412 INFO Fetch successful Feb 12 21:56:50.414373 coreos-metadata[1618]: Feb 12 21:56:50.412 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 12 21:56:50.417378 coreos-metadata[1618]: Feb 12 21:56:50.417 INFO Fetch successful Feb 12 21:56:50.419957 unknown[1618]: wrote ssh authorized keys file for user: core Feb 12 21:56:50.442047 update-ssh-keys[1796]: Updated "/home/core/.ssh/authorized_keys" Feb 12 21:56:50.442559 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 21:56:50.465460 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 12 21:56:50.540062 tar[1634]: ./host-device Feb 12 21:56:50.560069 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessagingDeliveryService] Starting message polling Feb 12 21:56:50.654760 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 12 21:56:50.721133 tar[1634]: ./tuning Feb 12 21:56:50.749733 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [instanceID=i-0c37d015f66492e9f] Starting association polling Feb 12 21:56:50.828176 tar[1634]: ./vrf Feb 12 21:56:50.844950 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 12 21:56:50.940403 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 12 21:56:50.950271 tar[1634]: ./sbr Feb 12 21:56:51.009398 systemd[1]: Finished prepare-critools.service. Feb 12 21:56:51.031694 tar[1634]: ./tap Feb 12 21:56:51.035868 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 12 21:56:51.087390 tar[1634]: ./dhcp Feb 12 21:56:51.131531 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 12 21:56:51.222417 tar[1634]: ./static Feb 12 21:56:51.227386 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 12 21:56:51.261862 tar[1634]: ./firewall Feb 12 21:56:51.321884 tar[1634]: ./macvlan Feb 12 21:56:51.323545 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [OfflineService] Starting document processing engine... Feb 12 21:56:51.394438 tar[1634]: ./dummy Feb 12 21:56:51.419800 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [OfflineService] [EngineProcessor] Starting Feb 12 21:56:51.449570 tar[1634]: ./bridge Feb 12 21:56:51.483384 sshd_keygen[1655]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 21:56:51.509408 tar[1634]: ./ipvlan Feb 12 21:56:51.516461 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [OfflineService] [EngineProcessor] Initial processing Feb 12 21:56:51.527649 systemd[1]: Finished sshd-keygen.service. Feb 12 21:56:51.531038 systemd[1]: Starting issuegen.service... Feb 12 21:56:51.534142 systemd[1]: Started sshd@0-172.31.16.216:22-139.178.89.65:59022.service. Feb 12 21:56:51.543868 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 21:56:51.544153 systemd[1]: Finished issuegen.service. Feb 12 21:56:51.547610 systemd[1]: Starting systemd-user-sessions.service... Feb 12 21:56:51.563165 systemd[1]: Finished systemd-user-sessions.service. Feb 12 21:56:51.566885 systemd[1]: Started getty@tty1.service. Feb 12 21:56:51.571187 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 21:56:51.572660 systemd[1]: Reached target getty.target. Feb 12 21:56:51.575937 tar[1634]: ./portmap Feb 12 21:56:51.613482 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [OfflineService] Starting message polling Feb 12 21:56:51.620346 tar[1634]: ./host-local Feb 12 21:56:51.668290 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 21:56:51.670053 systemd[1]: Reached target multi-user.target. Feb 12 21:56:51.673984 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 21:56:51.685740 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 21:56:51.685966 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 21:56:51.687523 systemd[1]: Startup finished in 664ms (kernel) + 9.486s (initrd) + 10.457s (userspace) = 20.607s. Feb 12 21:56:51.710360 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [OfflineService] Starting send replies to MDS Feb 12 21:56:51.733472 locksmithd[1701]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 21:56:51.782405 sshd[1818]: Accepted publickey for core from 139.178.89.65 port 59022 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:51.785261 sshd[1818]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:51.799506 systemd[1]: Created slice user-500.slice. Feb 12 21:56:51.813068 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessageGatewayService] Starting session document processing engine... Feb 12 21:56:51.803810 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 21:56:51.817302 systemd-logind[1627]: New session 1 of user core. Feb 12 21:56:51.823652 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 21:56:51.825676 systemd[1]: Starting user@500.service... Feb 12 21:56:51.833732 (systemd)[1833]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:51.908617 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 12 21:56:51.933486 systemd[1833]: Queued start job for default target default.target. Feb 12 21:56:51.935032 systemd[1833]: Reached target paths.target. Feb 12 21:56:51.935064 systemd[1833]: Reached target sockets.target. Feb 12 21:56:51.935083 systemd[1833]: Reached target timers.target. Feb 12 21:56:51.935099 systemd[1833]: Reached target basic.target. Feb 12 21:56:51.935156 systemd[1833]: Reached target default.target. Feb 12 21:56:51.935196 systemd[1833]: Startup finished in 92ms. Feb 12 21:56:51.935516 systemd[1]: Started user@500.service. Feb 12 21:56:51.937026 systemd[1]: Started session-1.scope. Feb 12 21:56:52.006028 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 12 21:56:52.093158 systemd[1]: Started sshd@1-172.31.16.216:22-139.178.89.65:43752.service. Feb 12 21:56:52.103670 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0c37d015f66492e9f, requestId: 07cccc5b-f808-4133-94b6-a424da40713f Feb 12 21:56:52.201642 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessageGatewayService] listening reply. Feb 12 21:56:52.258826 sshd[1842]: Accepted publickey for core from 139.178.89.65 port 43752 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:52.260383 sshd[1842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:52.268551 systemd[1]: Started session-2.scope. Feb 12 21:56:52.269497 systemd-logind[1627]: New session 2 of user core. Feb 12 21:56:52.299614 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 12 21:56:52.398147 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [HealthCheck] HealthCheck reporting agent health. Feb 12 21:56:52.400978 sshd[1842]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:52.405879 systemd[1]: sshd@1-172.31.16.216:22-139.178.89.65:43752.service: Deactivated successfully. Feb 12 21:56:52.407590 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 21:56:52.409042 systemd-logind[1627]: Session 2 logged out. Waiting for processes to exit. Feb 12 21:56:52.411039 systemd-logind[1627]: Removed session 2. Feb 12 21:56:52.427064 systemd[1]: Started sshd@2-172.31.16.216:22-139.178.89.65:43766.service. Feb 12 21:56:52.496676 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 12 21:56:52.589793 sshd[1848]: Accepted publickey for core from 139.178.89.65 port 43766 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:52.591538 sshd[1848]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:52.596375 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 12 21:56:52.597686 systemd-logind[1627]: New session 3 of user core. Feb 12 21:56:52.598471 systemd[1]: Started session-3.scope. Feb 12 21:56:52.694014 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [StartupProcessor] Executing startup processor tasks Feb 12 21:56:52.726054 sshd[1848]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:52.731330 systemd[1]: sshd@2-172.31.16.216:22-139.178.89.65:43766.service: Deactivated successfully. Feb 12 21:56:52.732694 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 21:56:52.733482 systemd-logind[1627]: Session 3 logged out. Waiting for processes to exit. Feb 12 21:56:52.735006 systemd-logind[1627]: Removed session 3. Feb 12 21:56:52.750322 systemd[1]: Started sshd@3-172.31.16.216:22-139.178.89.65:43774.service. Feb 12 21:56:52.793050 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 12 21:56:52.892325 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 12 21:56:52.912775 sshd[1854]: Accepted publickey for core from 139.178.89.65 port 43774 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:52.914780 sshd[1854]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:52.924007 systemd-logind[1627]: New session 4 of user core. Feb 12 21:56:52.924135 systemd[1]: Started session-4.scope. Feb 12 21:56:52.991762 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 12 21:56:53.050386 sshd[1854]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:53.055705 systemd[1]: sshd@3-172.31.16.216:22-139.178.89.65:43774.service: Deactivated successfully. Feb 12 21:56:53.057826 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 21:56:53.059116 systemd-logind[1627]: Session 4 logged out. Waiting for processes to exit. Feb 12 21:56:53.061696 systemd-logind[1627]: Removed session 4. Feb 12 21:56:53.077599 systemd[1]: Started sshd@4-172.31.16.216:22-139.178.89.65:43776.service. Feb 12 21:56:53.091412 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0c37d015f66492e9f?role=subscribe&stream=input Feb 12 21:56:53.191622 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0c37d015f66492e9f?role=subscribe&stream=input Feb 12 21:56:53.246733 sshd[1860]: Accepted publickey for core from 139.178.89.65 port 43776 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:53.248969 sshd[1860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:53.255891 systemd[1]: Started session-5.scope. Feb 12 21:56:53.256537 systemd-logind[1627]: New session 5 of user core. Feb 12 21:56:53.291875 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessageGatewayService] Starting receiving message from control channel Feb 12 21:56:53.383146 sudo[1863]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 21:56:53.383502 sudo[1863]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:53.391329 dbus-daemon[1619]: \xd0=D\xd2\xc7U: received setenforce notice (enforcing=-1013826016) Feb 12 21:56:53.392581 amazon-ssm-agent[1640]: 2024-02-12 21:56:50 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 12 21:56:53.393788 sudo[1863]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:53.417025 sshd[1860]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:53.421129 systemd[1]: sshd@4-172.31.16.216:22-139.178.89.65:43776.service: Deactivated successfully. Feb 12 21:56:53.422474 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 21:56:53.423281 systemd-logind[1627]: Session 5 logged out. Waiting for processes to exit. Feb 12 21:56:53.428617 systemd-logind[1627]: Removed session 5. Feb 12 21:56:53.443161 systemd[1]: Started sshd@5-172.31.16.216:22-139.178.89.65:43790.service. Feb 12 21:56:53.605386 sshd[1867]: Accepted publickey for core from 139.178.89.65 port 43790 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:53.607398 sshd[1867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:53.621110 systemd-logind[1627]: New session 6 of user core. Feb 12 21:56:53.622007 systemd[1]: Started session-6.scope. Feb 12 21:56:53.723363 sudo[1871]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 21:56:53.723659 sudo[1871]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:53.729012 sudo[1871]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:53.736040 sudo[1870]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 21:56:53.736559 sudo[1870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:53.749772 systemd[1]: Stopping audit-rules.service... Feb 12 21:56:53.750000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 21:56:53.753384 kernel: kauditd_printk_skb: 132 callbacks suppressed Feb 12 21:56:53.753456 kernel: audit: type=1305 audit(1707775013.750:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 21:56:53.753484 auditctl[1874]: No rules Feb 12 21:56:53.754269 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 21:56:53.754472 systemd[1]: Stopped audit-rules.service. Feb 12 21:56:53.757341 systemd[1]: Starting audit-rules.service... Feb 12 21:56:53.750000 audit[1874]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffef1599a30 a2=420 a3=0 items=0 ppid=1 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:53.773583 kernel: audit: type=1300 audit(1707775013.750:160): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffef1599a30 a2=420 a3=0 items=0 ppid=1 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:53.773693 kernel: audit: type=1327 audit(1707775013.750:160): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 21:56:53.750000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 21:56:53.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:53.779953 kernel: audit: type=1131 audit(1707775013.752:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:53.791828 augenrules[1891]: No rules Feb 12 21:56:53.792644 systemd[1]: Finished audit-rules.service. Feb 12 21:56:53.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:53.793851 sudo[1870]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:53.792000 audit[1870]: USER_END pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:53.804829 kernel: audit: type=1130 audit(1707775013.792:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:53.804955 kernel: audit: type=1106 audit(1707775013.792:163): pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:53.804985 kernel: audit: type=1104 audit(1707775013.793:164): pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:53.793000 audit[1870]: CRED_DISP pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:53.816541 sshd[1867]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:53.817000 audit[1867]: USER_END pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:53.821056 systemd[1]: sshd@5-172.31.16.216:22-139.178.89.65:43790.service: Deactivated successfully. Feb 12 21:56:53.822242 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 21:56:53.824248 systemd-logind[1627]: Session 6 logged out. Waiting for processes to exit. Feb 12 21:56:53.825594 systemd-logind[1627]: Removed session 6. Feb 12 21:56:53.817000 audit[1867]: CRED_DISP pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:53.832200 kernel: audit: type=1106 audit(1707775013.817:165): pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:53.832309 kernel: audit: type=1104 audit(1707775013.817:166): pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:53.832339 kernel: audit: type=1131 audit(1707775013.820:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.16.216:22-139.178.89.65:43790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:53.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.16.216:22-139.178.89.65:43790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:53.842822 systemd[1]: Started sshd@6-172.31.16.216:22-139.178.89.65:43806.service. Feb 12 21:56:53.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.16.216:22-139.178.89.65:43806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:54.004000 audit[1897]: USER_ACCT pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:54.006024 sshd[1897]: Accepted publickey for core from 139.178.89.65 port 43806 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:54.006000 audit[1897]: CRED_ACQ pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:54.006000 audit[1897]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4bccc6c0 a2=3 a3=0 items=0 ppid=1 pid=1897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:54.006000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:54.008164 sshd[1897]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:54.013940 systemd[1]: Started session-7.scope. Feb 12 21:56:54.014796 systemd-logind[1627]: New session 7 of user core. Feb 12 21:56:54.019000 audit[1897]: USER_START pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:54.021000 audit[1899]: CRED_ACQ pid=1899 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:54.117000 audit[1900]: USER_ACCT pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:54.118834 sudo[1900]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 21:56:54.118000 audit[1900]: CRED_REFR pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:54.119151 sudo[1900]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:54.120000 audit[1900]: USER_START pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:54.703974 systemd[1]: Reloading. Feb 12 21:56:54.830641 /usr/lib/systemd/system-generators/torcx-generator[1929]: time="2024-02-12T21:56:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 21:56:54.830685 /usr/lib/systemd/system-generators/torcx-generator[1929]: time="2024-02-12T21:56:54Z" level=info msg="torcx already run" Feb 12 21:56:54.974641 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 21:56:54.974732 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 21:56:55.018513 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 21:56:55.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit: BPF prog-id=34 op=LOAD Feb 12 21:56:55.123000 audit: BPF prog-id=15 op=UNLOAD Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit: BPF prog-id=35 op=LOAD Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.123000 audit: BPF prog-id=36 op=LOAD Feb 12 21:56:55.123000 audit: BPF prog-id=16 op=UNLOAD Feb 12 21:56:55.123000 audit: BPF prog-id=17 op=UNLOAD Feb 12 21:56:55.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit: BPF prog-id=37 op=LOAD Feb 12 21:56:55.125000 audit: BPF prog-id=29 op=UNLOAD Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit: BPF prog-id=38 op=LOAD Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.125000 audit: BPF prog-id=39 op=LOAD Feb 12 21:56:55.125000 audit: BPF prog-id=30 op=UNLOAD Feb 12 21:56:55.125000 audit: BPF prog-id=31 op=UNLOAD Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit: BPF prog-id=40 op=LOAD Feb 12 21:56:55.128000 audit: BPF prog-id=26 op=UNLOAD Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit: BPF prog-id=41 op=LOAD Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.128000 audit: BPF prog-id=42 op=LOAD Feb 12 21:56:55.128000 audit: BPF prog-id=27 op=UNLOAD Feb 12 21:56:55.128000 audit: BPF prog-id=28 op=UNLOAD Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit: BPF prog-id=43 op=LOAD Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.129000 audit: BPF prog-id=44 op=LOAD Feb 12 21:56:55.129000 audit: BPF prog-id=18 op=UNLOAD Feb 12 21:56:55.129000 audit: BPF prog-id=19 op=UNLOAD Feb 12 21:56:55.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.140000 audit: BPF prog-id=45 op=LOAD Feb 12 21:56:55.140000 audit: BPF prog-id=21 op=UNLOAD Feb 12 21:56:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit: BPF prog-id=46 op=LOAD Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit: BPF prog-id=47 op=LOAD Feb 12 21:56:55.141000 audit: BPF prog-id=22 op=UNLOAD Feb 12 21:56:55.141000 audit: BPF prog-id=23 op=UNLOAD Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.142000 audit: BPF prog-id=48 op=LOAD Feb 12 21:56:55.142000 audit: BPF prog-id=20 op=UNLOAD Feb 12 21:56:55.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.144000 audit: BPF prog-id=49 op=LOAD Feb 12 21:56:55.144000 audit: BPF prog-id=32 op=UNLOAD Feb 12 21:56:55.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.147000 audit: BPF prog-id=50 op=LOAD Feb 12 21:56:55.147000 audit: BPF prog-id=25 op=UNLOAD Feb 12 21:56:55.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:55.148000 audit: BPF prog-id=51 op=LOAD Feb 12 21:56:55.148000 audit: BPF prog-id=24 op=UNLOAD Feb 12 21:56:55.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:55.172787 systemd[1]: Started kubelet.service. Feb 12 21:56:55.207287 systemd[1]: Starting coreos-metadata.service... Feb 12 21:56:55.286968 kubelet[1981]: E0212 21:56:55.279814 1981 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 21:56:55.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 21:56:55.290660 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 21:56:55.290843 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 21:56:55.347282 coreos-metadata[1989]: Feb 12 21:56:55.347 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 12 21:56:55.348365 coreos-metadata[1989]: Feb 12 21:56:55.348 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Feb 12 21:56:55.349001 coreos-metadata[1989]: Feb 12 21:56:55.348 INFO Fetch successful Feb 12 21:56:55.349001 coreos-metadata[1989]: Feb 12 21:56:55.348 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Feb 12 21:56:55.349514 coreos-metadata[1989]: Feb 12 21:56:55.349 INFO Fetch successful Feb 12 21:56:55.349627 coreos-metadata[1989]: Feb 12 21:56:55.349 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Feb 12 21:56:55.350139 coreos-metadata[1989]: Feb 12 21:56:55.350 INFO Fetch successful Feb 12 21:56:55.350211 coreos-metadata[1989]: Feb 12 21:56:55.350 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Feb 12 21:56:55.350577 coreos-metadata[1989]: Feb 12 21:56:55.350 INFO Fetch successful Feb 12 21:56:55.350643 coreos-metadata[1989]: Feb 12 21:56:55.350 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Feb 12 21:56:55.351302 coreos-metadata[1989]: Feb 12 21:56:55.351 INFO Fetch successful Feb 12 21:56:55.351390 coreos-metadata[1989]: Feb 12 21:56:55.351 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Feb 12 21:56:55.352138 coreos-metadata[1989]: Feb 12 21:56:55.352 INFO Fetch successful Feb 12 21:56:55.352138 coreos-metadata[1989]: Feb 12 21:56:55.352 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Feb 12 21:56:55.352683 coreos-metadata[1989]: Feb 12 21:56:55.352 INFO Fetch successful Feb 12 21:56:55.352683 coreos-metadata[1989]: Feb 12 21:56:55.352 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Feb 12 21:56:55.353097 coreos-metadata[1989]: Feb 12 21:56:55.353 INFO Fetch successful Feb 12 21:56:55.370757 systemd[1]: Finished coreos-metadata.service. Feb 12 21:56:55.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:56.350792 systemd[1]: Stopped kubelet.service. Feb 12 21:56:56.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:56.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:56.374477 systemd[1]: Reloading. Feb 12 21:56:56.504874 /usr/lib/systemd/system-generators/torcx-generator[2045]: time="2024-02-12T21:56:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 21:56:56.504973 /usr/lib/systemd/system-generators/torcx-generator[2045]: time="2024-02-12T21:56:56Z" level=info msg="torcx already run" Feb 12 21:56:56.614744 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 21:56:56.614767 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 21:56:56.638181 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit: BPF prog-id=52 op=LOAD Feb 12 21:56:56.727000 audit: BPF prog-id=34 op=UNLOAD Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit: BPF prog-id=53 op=LOAD Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.728000 audit: BPF prog-id=54 op=LOAD Feb 12 21:56:56.728000 audit: BPF prog-id=35 op=UNLOAD Feb 12 21:56:56.728000 audit: BPF prog-id=36 op=UNLOAD Feb 12 21:56:56.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit: BPF prog-id=55 op=LOAD Feb 12 21:56:56.730000 audit: BPF prog-id=37 op=UNLOAD Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit: BPF prog-id=56 op=LOAD Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.730000 audit: BPF prog-id=57 op=LOAD Feb 12 21:56:56.730000 audit: BPF prog-id=38 op=UNLOAD Feb 12 21:56:56.730000 audit: BPF prog-id=39 op=UNLOAD Feb 12 21:56:56.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit: BPF prog-id=58 op=LOAD Feb 12 21:56:56.732000 audit: BPF prog-id=40 op=UNLOAD Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit: BPF prog-id=59 op=LOAD Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.732000 audit: BPF prog-id=60 op=LOAD Feb 12 21:56:56.732000 audit: BPF prog-id=41 op=UNLOAD Feb 12 21:56:56.732000 audit: BPF prog-id=42 op=UNLOAD Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit: BPF prog-id=61 op=LOAD Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.733000 audit: BPF prog-id=62 op=LOAD Feb 12 21:56:56.733000 audit: BPF prog-id=43 op=UNLOAD Feb 12 21:56:56.733000 audit: BPF prog-id=44 op=UNLOAD Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit: BPF prog-id=63 op=LOAD Feb 12 21:56:56.737000 audit: BPF prog-id=48 op=UNLOAD Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit: BPF prog-id=64 op=LOAD Feb 12 21:56:56.738000 audit: BPF prog-id=45 op=UNLOAD Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit: BPF prog-id=65 op=LOAD Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.738000 audit: BPF prog-id=66 op=LOAD Feb 12 21:56:56.738000 audit: BPF prog-id=46 op=UNLOAD Feb 12 21:56:56.738000 audit: BPF prog-id=47 op=UNLOAD Feb 12 21:56:56.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.741000 audit: BPF prog-id=67 op=LOAD Feb 12 21:56:56.741000 audit: BPF prog-id=49 op=UNLOAD Feb 12 21:56:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.744000 audit: BPF prog-id=68 op=LOAD Feb 12 21:56:56.744000 audit: BPF prog-id=50 op=UNLOAD Feb 12 21:56:56.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:56.745000 audit: BPF prog-id=69 op=LOAD Feb 12 21:56:56.745000 audit: BPF prog-id=51 op=UNLOAD Feb 12 21:56:56.765548 systemd[1]: Started kubelet.service. Feb 12 21:56:56.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:56.842591 kubelet[2097]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 21:56:56.842959 kubelet[2097]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 21:56:56.842959 kubelet[2097]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 21:56:56.843139 kubelet[2097]: I0212 21:56:56.843029 2097 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 21:56:57.137685 kubelet[2097]: I0212 21:56:57.137653 2097 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 21:56:57.137685 kubelet[2097]: I0212 21:56:57.137678 2097 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 21:56:57.137954 kubelet[2097]: I0212 21:56:57.137940 2097 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 21:56:57.141615 kubelet[2097]: I0212 21:56:57.141586 2097 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 21:56:57.144313 kubelet[2097]: I0212 21:56:57.144288 2097 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 21:56:57.144829 kubelet[2097]: I0212 21:56:57.144805 2097 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 21:56:57.144951 kubelet[2097]: I0212 21:56:57.144922 2097 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 21:56:57.144951 kubelet[2097]: I0212 21:56:57.144944 2097 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 21:56:57.145126 kubelet[2097]: I0212 21:56:57.144964 2097 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 21:56:57.145126 kubelet[2097]: I0212 21:56:57.145077 2097 state_mem.go:36] "Initialized new in-memory state store" Feb 12 21:56:57.148581 kubelet[2097]: I0212 21:56:57.148558 2097 kubelet.go:405] "Attempting to sync node with API server" Feb 12 21:56:57.148743 kubelet[2097]: I0212 21:56:57.148588 2097 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 21:56:57.148743 kubelet[2097]: I0212 21:56:57.148609 2097 kubelet.go:309] "Adding apiserver pod source" Feb 12 21:56:57.148743 kubelet[2097]: I0212 21:56:57.148625 2097 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 21:56:57.149778 kubelet[2097]: E0212 21:56:57.149762 2097 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:56:57.149931 kubelet[2097]: E0212 21:56:57.149919 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:56:57.150242 kubelet[2097]: I0212 21:56:57.150217 2097 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 21:56:57.150559 kubelet[2097]: W0212 21:56:57.150542 2097 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 21:56:57.151147 kubelet[2097]: I0212 21:56:57.151128 2097 server.go:1168] "Started kubelet" Feb 12 21:56:57.151324 kubelet[2097]: I0212 21:56:57.151311 2097 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 21:56:57.154289 kubelet[2097]: I0212 21:56:57.154267 2097 server.go:461] "Adding debug handlers to kubelet server" Feb 12 21:56:57.155000 audit[2097]: AVC avc: denied { mac_admin } for pid=2097 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:57.155000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 21:56:57.155000 audit[2097]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c03e30 a1=c000c2eaf8 a2=c000c03e00 a3=25 items=0 ppid=1 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.155000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 21:56:57.155000 audit[2097]: AVC avc: denied { mac_admin } for pid=2097 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:57.155000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 21:56:57.155000 audit[2097]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003bfbe0 a1=c000c2eb10 a2=c000c03ec0 a3=25 items=0 ppid=1 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.155000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 21:56:57.156976 kubelet[2097]: I0212 21:56:57.156147 2097 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 21:56:57.156976 kubelet[2097]: I0212 21:56:57.156190 2097 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 21:56:57.156976 kubelet[2097]: I0212 21:56:57.156538 2097 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 21:56:57.165511 kubelet[2097]: I0212 21:56:57.165478 2097 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 21:56:57.169328 kubelet[2097]: I0212 21:56:57.169295 2097 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 21:56:57.170029 kubelet[2097]: I0212 21:56:57.151350 2097 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 21:56:57.172790 kubelet[2097]: E0212 21:56:57.172756 2097 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 21:56:57.172790 kubelet[2097]: E0212 21:56:57.172790 2097 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 21:56:57.200051 kubelet[2097]: W0212 21:56:57.199981 2097 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 21:56:57.200466 kubelet[2097]: E0212 21:56:57.200448 2097 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 21:56:57.201111 kubelet[2097]: W0212 21:56:57.201091 2097 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 21:56:57.201720 kubelet[2097]: E0212 21:56:57.201702 2097 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 21:56:57.201720 kubelet[2097]: E0212 21:56:57.201276 2097 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.16.216\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 12 21:56:57.201838 kubelet[2097]: W0212 21:56:57.201679 2097 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.16.216" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 21:56:57.201838 kubelet[2097]: E0212 21:56:57.201751 2097 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.16.216" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 21:56:57.206686 kubelet[2097]: E0212 21:56:57.204466 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c54759406a9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 151104681, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 151104681, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.215945 kubelet[2097]: E0212 21:56:57.212524 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c5476deb8f4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 172777204, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 172777204, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.217000 audit[2109]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:56:57.217000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc39525d30 a2=0 a3=7ffc39525d1c items=0 ppid=2097 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 21:56:57.228000 audit[2114]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:56:57.228000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd33974570 a2=0 a3=7ffd3397455c items=0 ppid=2097 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 21:56:57.241140 kubelet[2097]: E0212 21:56:57.241047 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547ada9a07", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.16.216 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239616007, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239616007, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.242375 kubelet[2097]: I0212 21:56:57.242333 2097 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 21:56:57.242375 kubelet[2097]: I0212 21:56:57.242373 2097 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 21:56:57.242533 kubelet[2097]: I0212 21:56:57.242409 2097 state_mem.go:36] "Initialized new in-memory state store" Feb 12 21:56:57.244287 kubelet[2097]: E0212 21:56:57.244213 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547adab324", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.16.216 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239622436, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239622436, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.245386 kubelet[2097]: E0212 21:56:57.245307 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547adac06d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.16.216 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239625837, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239625837, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.251716 kubelet[2097]: I0212 21:56:57.251691 2097 policy_none.go:49] "None policy: Start" Feb 12 21:56:57.252760 kubelet[2097]: I0212 21:56:57.252742 2097 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 21:56:57.252939 kubelet[2097]: I0212 21:56:57.252927 2097 state_mem.go:35] "Initializing new in-memory state store" Feb 12 21:56:57.239000 audit[2116]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:56:57.239000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcd58b3470 a2=0 a3=7ffcd58b345c items=0 ppid=2097 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 21:56:57.257000 audit[2122]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:56:57.257000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd134d7740 a2=0 a3=7ffd134d772c items=0 ppid=2097 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 21:56:57.269968 kubelet[2097]: I0212 21:56:57.269941 2097 kubelet_node_status.go:70] "Attempting to register node" node="172.31.16.216" Feb 12 21:56:57.280798 kubelet[2097]: E0212 21:56:57.275000 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547ada9a07", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.16.216 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239616007, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 269885853, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.216.17b33c547ada9a07" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.280798 kubelet[2097]: E0212 21:56:57.275656 2097 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.16.216" Feb 12 21:56:57.281036 kubelet[2097]: E0212 21:56:57.276418 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547adab324", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.16.216 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239622436, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 269890695, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.216.17b33c547adab324" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.281128 kubelet[2097]: E0212 21:56:57.277894 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547adac06d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.16.216 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239625837, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 269893300, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.216.17b33c547adac06d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.288044 systemd[1]: Created slice kubepods.slice. Feb 12 21:56:57.300639 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 21:56:57.306363 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 21:56:57.314000 audit[2097]: AVC avc: denied { mac_admin } for pid=2097 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:57.314000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 21:56:57.314000 audit[2097]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cadd10 a1=c000cf6930 a2=c000cadce0 a3=25 items=0 ppid=1 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.314000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 21:56:57.316763 kubelet[2097]: I0212 21:56:57.315109 2097 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 21:56:57.316763 kubelet[2097]: I0212 21:56:57.315329 2097 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 21:56:57.316763 kubelet[2097]: I0212 21:56:57.315552 2097 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 21:56:57.321083 kubelet[2097]: E0212 21:56:57.321045 2097 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.16.216\" not found" Feb 12 21:56:57.322762 kubelet[2097]: E0212 21:56:57.322534 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547faed219", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 320632857, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 320632857, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.332000 audit[2127]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:56:57.332000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc8d473d40 a2=0 a3=7ffc8d473d2c items=0 ppid=2097 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 21:56:57.333886 kubelet[2097]: I0212 21:56:57.333861 2097 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 21:56:57.334000 audit[2128]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:56:57.334000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc92b35770 a2=0 a3=7ffc92b3575c items=0 ppid=2097 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 21:56:57.335546 kubelet[2097]: I0212 21:56:57.335470 2097 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 21:56:57.335546 kubelet[2097]: I0212 21:56:57.335496 2097 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 21:56:57.335546 kubelet[2097]: I0212 21:56:57.335517 2097 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 21:56:57.335676 kubelet[2097]: E0212 21:56:57.335571 2097 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 21:56:57.339017 kubelet[2097]: W0212 21:56:57.338862 2097 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 21:56:57.339178 kubelet[2097]: E0212 21:56:57.339163 2097 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 21:56:57.338000 audit[2129]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:56:57.338000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfe995b30 a2=0 a3=7ffcfe995b1c items=0 ppid=2097 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 21:56:57.339000 audit[2130]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:56:57.339000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda1572390 a2=0 a3=7ffda157237c items=0 ppid=2097 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 21:56:57.341000 audit[2131]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:56:57.341000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdfea2bf90 a2=0 a3=7ffdfea2bf7c items=0 ppid=2097 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 21:56:57.342000 audit[2132]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:56:57.342000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffed940e1f0 a2=0 a3=7ffed940e1dc items=0 ppid=2097 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.342000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 21:56:57.343000 audit[2133]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:56:57.343000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc156f1df0 a2=0 a3=7ffc156f1ddc items=0 ppid=2097 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 21:56:57.345000 audit[2134]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:56:57.345000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd513f0320 a2=0 a3=7ffd513f030c items=0 ppid=2097 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:57.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 21:56:57.403870 kubelet[2097]: E0212 21:56:57.403758 2097 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.16.216\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 12 21:56:57.477143 kubelet[2097]: I0212 21:56:57.477107 2097 kubelet_node_status.go:70] "Attempting to register node" node="172.31.16.216" Feb 12 21:56:57.488259 kubelet[2097]: E0212 21:56:57.488210 2097 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.16.216" Feb 12 21:56:57.489051 kubelet[2097]: E0212 21:56:57.488406 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547ada9a07", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.16.216 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239616007, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 477062378, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.216.17b33c547ada9a07" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.491618 kubelet[2097]: E0212 21:56:57.491537 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547adab324", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.16.216 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239622436, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 477077150, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.216.17b33c547adab324" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.493061 kubelet[2097]: E0212 21:56:57.492992 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547adac06d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.16.216 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239625837, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 477080982, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.216.17b33c547adac06d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.813999 kubelet[2097]: E0212 21:56:57.813891 2097 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.16.216\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 12 21:56:57.890534 kubelet[2097]: I0212 21:56:57.890499 2097 kubelet_node_status.go:70] "Attempting to register node" node="172.31.16.216" Feb 12 21:56:57.893797 kubelet[2097]: E0212 21:56:57.893764 2097 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.16.216" Feb 12 21:56:57.894034 kubelet[2097]: E0212 21:56:57.893733 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547ada9a07", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.16.216 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239616007, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 890456753, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.216.17b33c547ada9a07" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.896113 kubelet[2097]: E0212 21:56:57.896038 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547adab324", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.16.216 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239622436, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 890468260, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.216.17b33c547adab324" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:57.898135 kubelet[2097]: E0212 21:56:57.897594 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216.17b33c547adac06d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.216", UID:"172.31.16.216", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.16.216 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.216"}, FirstTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 239625837, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 21, 56, 57, 890472600, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.216.17b33c547adac06d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 21:56:58.075046 kubelet[2097]: W0212 21:56:58.075010 2097 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.16.216" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 21:56:58.075046 kubelet[2097]: E0212 21:56:58.075051 2097 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.16.216" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 21:56:58.140297 kubelet[2097]: I0212 21:56:58.140223 2097 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 21:56:58.150602 kubelet[2097]: E0212 21:56:58.150558 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:56:58.609115 kubelet[2097]: E0212 21:56:58.609072 2097 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.16.216" not found Feb 12 21:56:58.621808 kubelet[2097]: E0212 21:56:58.621776 2097 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.16.216\" not found" node="172.31.16.216" Feb 12 21:56:58.695656 kubelet[2097]: I0212 21:56:58.695623 2097 kubelet_node_status.go:70] "Attempting to register node" node="172.31.16.216" Feb 12 21:56:58.703973 kubelet[2097]: I0212 21:56:58.703938 2097 kubelet_node_status.go:73] "Successfully registered node" node="172.31.16.216" Feb 12 21:56:58.715481 kubelet[2097]: E0212 21:56:58.715409 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:58.806211 sudo[1900]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:58.805000 audit[1900]: USER_END pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:58.809543 kernel: kauditd_printk_skb: 477 callbacks suppressed Feb 12 21:56:58.809645 kernel: audit: type=1106 audit(1707775018.805:610): pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:58.805000 audit[1900]: CRED_DISP pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:58.816374 kubelet[2097]: E0212 21:56:58.816348 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:58.820986 kernel: audit: type=1104 audit(1707775018.805:611): pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:58.832456 sshd[1897]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:58.834000 audit[1897]: USER_END pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:58.838232 systemd[1]: sshd@6-172.31.16.216:22-139.178.89.65:43806.service: Deactivated successfully. Feb 12 21:56:58.839227 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 21:56:58.841346 systemd-logind[1627]: Session 7 logged out. Waiting for processes to exit. Feb 12 21:56:58.834000 audit[1897]: CRED_DISP pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:58.846059 systemd-logind[1627]: Removed session 7. Feb 12 21:56:58.852228 kernel: audit: type=1106 audit(1707775018.834:612): pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:58.852354 kernel: audit: type=1104 audit(1707775018.834:613): pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:58.852384 kernel: audit: type=1131 audit(1707775018.834:614): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.16.216:22-139.178.89.65:43806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:58.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.16.216:22-139.178.89.65:43806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:58.917088 kubelet[2097]: E0212 21:56:58.916889 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:59.017846 kubelet[2097]: E0212 21:56:59.017799 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:59.118601 kubelet[2097]: E0212 21:56:59.118558 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:59.151226 kubelet[2097]: E0212 21:56:59.151177 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:56:59.218974 kubelet[2097]: E0212 21:56:59.218846 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:59.319502 kubelet[2097]: E0212 21:56:59.319455 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:59.420017 kubelet[2097]: E0212 21:56:59.419972 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:59.520725 kubelet[2097]: E0212 21:56:59.520541 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:59.621234 kubelet[2097]: E0212 21:56:59.621184 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:59.722101 kubelet[2097]: E0212 21:56:59.722055 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:59.822625 kubelet[2097]: E0212 21:56:59.822589 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:56:59.923265 kubelet[2097]: E0212 21:56:59.923219 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:57:00.024108 kubelet[2097]: E0212 21:57:00.024026 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:57:00.125011 kubelet[2097]: E0212 21:57:00.124797 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:57:00.151577 kubelet[2097]: E0212 21:57:00.151521 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:00.225391 kubelet[2097]: E0212 21:57:00.225347 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:57:00.326445 kubelet[2097]: E0212 21:57:00.326393 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:57:00.426887 kubelet[2097]: E0212 21:57:00.426769 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:57:00.527407 kubelet[2097]: E0212 21:57:00.527356 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:57:00.628031 kubelet[2097]: E0212 21:57:00.627972 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:57:00.728996 kubelet[2097]: E0212 21:57:00.728812 2097 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.16.216\" not found" Feb 12 21:57:00.830426 kubelet[2097]: I0212 21:57:00.830388 2097 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 21:57:00.831045 env[1644]: time="2024-02-12T21:57:00.830990375Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 21:57:00.831526 kubelet[2097]: I0212 21:57:00.831214 2097 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 21:57:01.152250 kubelet[2097]: E0212 21:57:01.152204 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:01.152250 kubelet[2097]: I0212 21:57:01.152212 2097 apiserver.go:52] "Watching apiserver" Feb 12 21:57:01.155584 kubelet[2097]: I0212 21:57:01.155551 2097 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:57:01.155768 kubelet[2097]: I0212 21:57:01.155636 2097 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:57:01.156889 kubelet[2097]: I0212 21:57:01.156281 2097 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:57:01.156889 kubelet[2097]: E0212 21:57:01.156444 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7pdj" podUID=7c92dae7-3f63-4e9c-99ad-89ea5c329db3 Feb 12 21:57:01.168712 systemd[1]: Created slice kubepods-besteffort-pod11108afe_5bf2_4a8d_a2e7_87a408ffb0e4.slice. Feb 12 21:57:01.171034 kubelet[2097]: I0212 21:57:01.170300 2097 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 21:57:01.195671 kubelet[2097]: I0212 21:57:01.195639 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-cni-bin-dir\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.195826 kubelet[2097]: I0212 21:57:01.195691 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7c92dae7-3f63-4e9c-99ad-89ea5c329db3-kubelet-dir\") pod \"csi-node-driver-m7pdj\" (UID: \"7c92dae7-3f63-4e9c-99ad-89ea5c329db3\") " pod="calico-system/csi-node-driver-m7pdj" Feb 12 21:57:01.195826 kubelet[2097]: I0212 21:57:01.195720 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-node-certs\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.195826 kubelet[2097]: I0212 21:57:01.195748 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-var-run-calico\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.195826 kubelet[2097]: I0212 21:57:01.195774 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-cni-net-dir\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.195826 kubelet[2097]: I0212 21:57:01.195799 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7c92dae7-3f63-4e9c-99ad-89ea5c329db3-registration-dir\") pod \"csi-node-driver-m7pdj\" (UID: \"7c92dae7-3f63-4e9c-99ad-89ea5c329db3\") " pod="calico-system/csi-node-driver-m7pdj" Feb 12 21:57:01.196180 kubelet[2097]: I0212 21:57:01.195848 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wd98z\" (UniqueName: \"kubernetes.io/projected/7c92dae7-3f63-4e9c-99ad-89ea5c329db3-kube-api-access-wd98z\") pod \"csi-node-driver-m7pdj\" (UID: \"7c92dae7-3f63-4e9c-99ad-89ea5c329db3\") " pod="calico-system/csi-node-driver-m7pdj" Feb 12 21:57:01.196180 kubelet[2097]: I0212 21:57:01.195879 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/11108afe-5bf2-4a8d-a2e7-87a408ffb0e4-kube-proxy\") pod \"kube-proxy-92jsq\" (UID: \"11108afe-5bf2-4a8d-a2e7-87a408ffb0e4\") " pod="kube-system/kube-proxy-92jsq" Feb 12 21:57:01.196180 kubelet[2097]: I0212 21:57:01.195923 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/11108afe-5bf2-4a8d-a2e7-87a408ffb0e4-xtables-lock\") pod \"kube-proxy-92jsq\" (UID: \"11108afe-5bf2-4a8d-a2e7-87a408ffb0e4\") " pod="kube-system/kube-proxy-92jsq" Feb 12 21:57:01.196180 kubelet[2097]: I0212 21:57:01.195954 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-policysync\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.196180 kubelet[2097]: I0212 21:57:01.195985 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7c92dae7-3f63-4e9c-99ad-89ea5c329db3-socket-dir\") pod \"csi-node-driver-m7pdj\" (UID: \"7c92dae7-3f63-4e9c-99ad-89ea5c329db3\") " pod="calico-system/csi-node-driver-m7pdj" Feb 12 21:57:01.196431 kubelet[2097]: I0212 21:57:01.196017 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-tigera-ca-bundle\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.196431 kubelet[2097]: I0212 21:57:01.196047 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-var-lib-calico\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.196431 kubelet[2097]: I0212 21:57:01.196155 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-flexvol-driver-host\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.196431 kubelet[2097]: I0212 21:57:01.196192 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-xtables-lock\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.196431 kubelet[2097]: I0212 21:57:01.196222 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-cni-log-dir\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.196705 kubelet[2097]: I0212 21:57:01.196253 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5hrc4\" (UniqueName: \"kubernetes.io/projected/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-kube-api-access-5hrc4\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.196705 kubelet[2097]: I0212 21:57:01.196285 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7c92dae7-3f63-4e9c-99ad-89ea5c329db3-varrun\") pod \"csi-node-driver-m7pdj\" (UID: \"7c92dae7-3f63-4e9c-99ad-89ea5c329db3\") " pod="calico-system/csi-node-driver-m7pdj" Feb 12 21:57:01.196705 kubelet[2097]: I0212 21:57:01.196314 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/11108afe-5bf2-4a8d-a2e7-87a408ffb0e4-lib-modules\") pod \"kube-proxy-92jsq\" (UID: \"11108afe-5bf2-4a8d-a2e7-87a408ffb0e4\") " pod="kube-system/kube-proxy-92jsq" Feb 12 21:57:01.196705 kubelet[2097]: I0212 21:57:01.196346 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hjp8f\" (UniqueName: \"kubernetes.io/projected/11108afe-5bf2-4a8d-a2e7-87a408ffb0e4-kube-api-access-hjp8f\") pod \"kube-proxy-92jsq\" (UID: \"11108afe-5bf2-4a8d-a2e7-87a408ffb0e4\") " pod="kube-system/kube-proxy-92jsq" Feb 12 21:57:01.196705 kubelet[2097]: I0212 21:57:01.196379 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b68abbae-769b-4f0d-9036-bb8ed6f6cf9f-lib-modules\") pod \"calico-node-85fkn\" (UID: \"b68abbae-769b-4f0d-9036-bb8ed6f6cf9f\") " pod="calico-system/calico-node-85fkn" Feb 12 21:57:01.196705 kubelet[2097]: I0212 21:57:01.196396 2097 reconciler.go:41] "Reconciler: start to sync state" Feb 12 21:57:01.200063 systemd[1]: Created slice kubepods-besteffort-podb68abbae_769b_4f0d_9036_bb8ed6f6cf9f.slice. Feb 12 21:57:01.301933 kubelet[2097]: E0212 21:57:01.301869 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:01.301933 kubelet[2097]: W0212 21:57:01.301919 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:01.301933 kubelet[2097]: E0212 21:57:01.301943 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:01.313725 kubelet[2097]: E0212 21:57:01.309724 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:01.313725 kubelet[2097]: W0212 21:57:01.309748 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:01.313725 kubelet[2097]: E0212 21:57:01.309778 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:01.330363 kubelet[2097]: E0212 21:57:01.330341 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:01.330565 kubelet[2097]: W0212 21:57:01.330548 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:01.330678 kubelet[2097]: E0212 21:57:01.330667 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:01.344211 kubelet[2097]: E0212 21:57:01.344185 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:01.344777 kubelet[2097]: W0212 21:57:01.344752 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:01.345050 kubelet[2097]: E0212 21:57:01.345026 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:01.363497 kubelet[2097]: E0212 21:57:01.363471 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:01.363497 kubelet[2097]: W0212 21:57:01.363495 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:01.363693 kubelet[2097]: E0212 21:57:01.363521 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:01.499362 env[1644]: time="2024-02-12T21:57:01.497497830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-92jsq,Uid:11108afe-5bf2-4a8d-a2e7-87a408ffb0e4,Namespace:kube-system,Attempt:0,}" Feb 12 21:57:01.505336 env[1644]: time="2024-02-12T21:57:01.504938393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-85fkn,Uid:b68abbae-769b-4f0d-9036-bb8ed6f6cf9f,Namespace:calico-system,Attempt:0,}" Feb 12 21:57:01.838857 amazon-ssm-agent[1640]: 2024-02-12 21:57:01 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 12 21:57:02.083012 env[1644]: time="2024-02-12T21:57:02.082845969Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:02.084325 env[1644]: time="2024-02-12T21:57:02.084275444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:02.090101 env[1644]: time="2024-02-12T21:57:02.089616967Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:02.091521 env[1644]: time="2024-02-12T21:57:02.091476646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:02.092778 env[1644]: time="2024-02-12T21:57:02.092647463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:02.096769 env[1644]: time="2024-02-12T21:57:02.096721060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:02.099440 env[1644]: time="2024-02-12T21:57:02.099383683Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:02.104861 env[1644]: time="2024-02-12T21:57:02.104793992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:02.148670 env[1644]: time="2024-02-12T21:57:02.148162106Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:57:02.148670 env[1644]: time="2024-02-12T21:57:02.148216119Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:57:02.148670 env[1644]: time="2024-02-12T21:57:02.148236838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:57:02.148670 env[1644]: time="2024-02-12T21:57:02.148451624Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/82617494e6abc6301f3ae3e71bc252cf109fcc3ddb4c9cfbb3ecc31a3220fb64 pid=2155 runtime=io.containerd.runc.v2 Feb 12 21:57:02.150055 env[1644]: time="2024-02-12T21:57:02.149677609Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:57:02.150055 env[1644]: time="2024-02-12T21:57:02.149717185Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:57:02.150055 env[1644]: time="2024-02-12T21:57:02.149731643Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:57:02.150055 env[1644]: time="2024-02-12T21:57:02.149878334Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5c610a5f122fe7cbc5fd5575223ff8dbc50189aba31733c50e05298cda240782 pid=2166 runtime=io.containerd.runc.v2 Feb 12 21:57:02.153107 kubelet[2097]: E0212 21:57:02.152930 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:02.187676 systemd[1]: Started cri-containerd-82617494e6abc6301f3ae3e71bc252cf109fcc3ddb4c9cfbb3ecc31a3220fb64.scope. Feb 12 21:57:02.219146 systemd[1]: Started cri-containerd-5c610a5f122fe7cbc5fd5575223ff8dbc50189aba31733c50e05298cda240782.scope. Feb 12 21:57:02.255277 kernel: audit: type=1400 audit(1707775022.237:615): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.255416 kernel: audit: type=1400 audit(1707775022.237:616): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.261113 kernel: audit: type=1400 audit(1707775022.237:617): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.277083 kernel: audit: type=1400 audit(1707775022.237:618): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285201 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 21:57:02.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.238000 audit: BPF prog-id=70 op=LOAD Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2155 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:02.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832363137343934653661626336333031663361653365373162633235 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2155 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:02.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832363137343934653661626336333031663361653365373162633235 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit: BPF prog-id=71 op=LOAD Feb 12 21:57:02.254000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00029f040 items=0 ppid=2155 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:02.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832363137343934653661626336333031663361653365373162633235 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.254000 audit: BPF prog-id=72 op=LOAD Feb 12 21:57:02.254000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00029f088 items=0 ppid=2155 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:02.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832363137343934653661626336333031663361653365373162633235 Feb 12 21:57:02.277000 audit: BPF prog-id=72 op=UNLOAD Feb 12 21:57:02.278000 audit: BPF prog-id=71 op=UNLOAD Feb 12 21:57:02.278000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.278000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.278000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.278000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.278000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.278000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.278000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.278000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.278000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.278000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.278000 audit: BPF prog-id=73 op=LOAD Feb 12 21:57:02.278000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00029f498 items=0 ppid=2155 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:02.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832363137343934653661626336333031663361653365373162633235 Feb 12 21:57:02.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.283000 audit: BPF prog-id=74 op=LOAD Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2166 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:02.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563363130613566313232666537636263356664353537353232336666 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2166 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:02.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563363130613566313232666537636263356664353537353232336666 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.284000 audit: BPF prog-id=75 op=LOAD Feb 12 21:57:02.284000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000386350 items=0 ppid=2166 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:02.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563363130613566313232666537636263356664353537353232336666 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit: BPF prog-id=76 op=LOAD Feb 12 21:57:02.285000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000386398 items=0 ppid=2166 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:02.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563363130613566313232666537636263356664353537353232336666 Feb 12 21:57:02.285000 audit: BPF prog-id=76 op=UNLOAD Feb 12 21:57:02.285000 audit: BPF prog-id=75 op=UNLOAD Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:02.285000 audit: BPF prog-id=77 op=LOAD Feb 12 21:57:02.285000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003867a8 items=0 ppid=2166 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:02.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563363130613566313232666537636263356664353537353232336666 Feb 12 21:57:02.318892 env[1644]: time="2024-02-12T21:57:02.318844245Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-92jsq,Uid:11108afe-5bf2-4a8d-a2e7-87a408ffb0e4,Namespace:kube-system,Attempt:0,} returns sandbox id \"5c610a5f122fe7cbc5fd5575223ff8dbc50189aba31733c50e05298cda240782\"" Feb 12 21:57:02.324687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1863999502.mount: Deactivated successfully. Feb 12 21:57:02.330122 env[1644]: time="2024-02-12T21:57:02.330083777Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 21:57:02.330393 env[1644]: time="2024-02-12T21:57:02.330130291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-85fkn,Uid:b68abbae-769b-4f0d-9036-bb8ed6f6cf9f,Namespace:calico-system,Attempt:0,} returns sandbox id \"82617494e6abc6301f3ae3e71bc252cf109fcc3ddb4c9cfbb3ecc31a3220fb64\"" Feb 12 21:57:03.153289 kubelet[2097]: E0212 21:57:03.153221 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:03.337996 kubelet[2097]: E0212 21:57:03.337223 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7pdj" podUID=7c92dae7-3f63-4e9c-99ad-89ea5c329db3 Feb 12 21:57:03.589915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3497706790.mount: Deactivated successfully. Feb 12 21:57:04.154387 kubelet[2097]: E0212 21:57:04.154329 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:04.415896 env[1644]: time="2024-02-12T21:57:04.414765161Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:04.425485 env[1644]: time="2024-02-12T21:57:04.425436158Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:04.432043 env[1644]: time="2024-02-12T21:57:04.431997232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:04.434648 env[1644]: time="2024-02-12T21:57:04.434600651Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:04.434990 env[1644]: time="2024-02-12T21:57:04.434959021Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 12 21:57:04.439264 env[1644]: time="2024-02-12T21:57:04.439221417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 21:57:04.444309 env[1644]: time="2024-02-12T21:57:04.441124132Z" level=info msg="CreateContainer within sandbox \"5c610a5f122fe7cbc5fd5575223ff8dbc50189aba31733c50e05298cda240782\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 21:57:04.470815 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2818179652.mount: Deactivated successfully. Feb 12 21:57:04.480408 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3541637221.mount: Deactivated successfully. Feb 12 21:57:04.486727 env[1644]: time="2024-02-12T21:57:04.486664199Z" level=info msg="CreateContainer within sandbox \"5c610a5f122fe7cbc5fd5575223ff8dbc50189aba31733c50e05298cda240782\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"aedfc583bea86a4efc60d668477ea2186cf279e5345b004b5c26a641cd7d6d72\"" Feb 12 21:57:04.487565 env[1644]: time="2024-02-12T21:57:04.487539475Z" level=info msg="StartContainer for \"aedfc583bea86a4efc60d668477ea2186cf279e5345b004b5c26a641cd7d6d72\"" Feb 12 21:57:04.513029 systemd[1]: Started cri-containerd-aedfc583bea86a4efc60d668477ea2186cf279e5345b004b5c26a641cd7d6d72.scope. Feb 12 21:57:04.537000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539961 kernel: kauditd_printk_skb: 111 callbacks suppressed Feb 12 21:57:04.540104 kernel: audit: type=1400 audit(1707775024.537:650): avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.537000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f90586d5898 items=0 ppid=2166 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.553401 kernel: audit: type=1300 audit(1707775024.537:650): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f90586d5898 items=0 ppid=2166 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.553505 kernel: audit: type=1327 audit(1707775024.537:650): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165646663353833626561383661346566633630643636383437376561 Feb 12 21:57:04.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165646663353833626561383661346566633630643636383437376561 Feb 12 21:57:04.539000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.563960 kernel: audit: type=1400 audit(1707775024.539:651): avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.564095 kernel: audit: type=1400 audit(1707775024.539:651): avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.568315 kernel: audit: type=1400 audit(1707775024.539:651): avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.577064 kernel: audit: type=1400 audit(1707775024.539:651): avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.577185 kernel: audit: type=1400 audit(1707775024.539:651): avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.586698 kernel: audit: type=1400 audit(1707775024.539:651): avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.586795 kernel: audit: type=1400 audit(1707775024.539:651): avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.539000 audit: BPF prog-id=78 op=LOAD Feb 12 21:57:04.539000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003e4278 items=0 ppid=2166 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165646663353833626561383661346566633630643636383437376561 Feb 12 21:57:04.558000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.558000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.558000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.558000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.558000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.558000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.558000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.558000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.558000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.558000 audit: BPF prog-id=79 op=LOAD Feb 12 21:57:04.558000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003e42c8 items=0 ppid=2166 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165646663353833626561383661346566633630643636383437376561 Feb 12 21:57:04.571000 audit: BPF prog-id=79 op=UNLOAD Feb 12 21:57:04.571000 audit: BPF prog-id=78 op=UNLOAD Feb 12 21:57:04.571000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.571000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.571000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.571000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.571000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.571000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.571000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.571000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.571000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.571000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:04.571000 audit: BPF prog-id=80 op=LOAD Feb 12 21:57:04.571000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003e4358 items=0 ppid=2166 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165646663353833626561383661346566633630643636383437376561 Feb 12 21:57:04.618877 env[1644]: time="2024-02-12T21:57:04.618821843Z" level=info msg="StartContainer for \"aedfc583bea86a4efc60d668477ea2186cf279e5345b004b5c26a641cd7d6d72\" returns successfully" Feb 12 21:57:04.731000 audit[2291]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.731000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbde6e6c0 a2=0 a3=7ffdbde6e6ac items=0 ppid=2253 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 21:57:04.738000 audit[2292]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:04.738000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf8b20840 a2=0 a3=7ffcf8b2082c items=0 ppid=2253 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 21:57:04.740000 audit[2293]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.740000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedce0d3f0 a2=0 a3=7ffedce0d3dc items=0 ppid=2253 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 21:57:04.741000 audit[2294]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:04.741000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1e1782f0 a2=0 a3=7fff1e1782dc items=0 ppid=2253 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 21:57:04.743000 audit[2296]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.743000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffaf8598e0 a2=0 a3=7fffaf8598cc items=0 ppid=2253 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 21:57:04.746000 audit[2297]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:04.746000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc35e703e0 a2=0 a3=7ffc35e703cc items=0 ppid=2253 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 21:57:04.835000 audit[2298]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.835000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff9965ba40 a2=0 a3=7fff9965ba2c items=0 ppid=2253 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 21:57:04.839000 audit[2300]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.839000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd87658e90 a2=0 a3=7ffd87658e7c items=0 ppid=2253 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 21:57:04.845000 audit[2303]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.845000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffafc0ec80 a2=0 a3=7fffafc0ec6c items=0 ppid=2253 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 21:57:04.846000 audit[2304]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.846000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4dfb0190 a2=0 a3=7ffe4dfb017c items=0 ppid=2253 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 21:57:04.849000 audit[2306]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.849000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0612a710 a2=0 a3=7ffd0612a6fc items=0 ppid=2253 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 21:57:04.851000 audit[2307]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.851000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfa8e3250 a2=0 a3=7ffdfa8e323c items=0 ppid=2253 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 21:57:04.855000 audit[2309]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.855000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff79d05150 a2=0 a3=7fff79d0513c items=0 ppid=2253 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 21:57:04.860000 audit[2312]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.860000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc6f6ff860 a2=0 a3=7ffc6f6ff84c items=0 ppid=2253 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 21:57:04.862000 audit[2313]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.862000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc519dc080 a2=0 a3=7ffc519dc06c items=0 ppid=2253 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 21:57:04.867000 audit[2315]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.867000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe8b3407b0 a2=0 a3=7ffe8b34079c items=0 ppid=2253 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 21:57:04.870000 audit[2316]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.870000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9def7d50 a2=0 a3=7ffe9def7d3c items=0 ppid=2253 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.870000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 21:57:04.875000 audit[2318]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.875000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc249a1cc0 a2=0 a3=7ffc249a1cac items=0 ppid=2253 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 21:57:04.880000 audit[2321]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.880000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2e55e710 a2=0 a3=7ffc2e55e6fc items=0 ppid=2253 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 21:57:04.887000 audit[2324]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.887000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9c2a14f0 a2=0 a3=7fff9c2a14dc items=0 ppid=2253 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 21:57:04.889000 audit[2325]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.889000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdb14bee40 a2=0 a3=7ffdb14bee2c items=0 ppid=2253 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 21:57:04.893000 audit[2327]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.893000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffbf5cddd0 a2=0 a3=7fffbf5cddbc items=0 ppid=2253 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 21:57:04.934000 audit[2332]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.934000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd3bfe34f0 a2=0 a3=7ffd3bfe34dc items=0 ppid=2253 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 21:57:04.944000 audit[2337]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.944000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7c7a7920 a2=0 a3=7ffc7c7a790c items=0 ppid=2253 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.944000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 21:57:04.947000 audit[2339]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 21:57:04.947000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc22e91000 a2=0 a3=7ffc22e90fec items=0 ppid=2253 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.947000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 21:57:04.957000 audit[2341]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:04.957000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffee3189f80 a2=0 a3=7ffee3189f6c items=0 ppid=2253 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:04.990000 audit[2341]: NETFILTER_CFG table=nat:40 family=2 entries=42 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:04.990000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffee3189f80 a2=0 a3=7ffee3189f6c items=0 ppid=2253 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:04.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:05.015000 audit[2348]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.015000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffffea06360 a2=0 a3=7ffffea0634c items=0 ppid=2253 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 21:57:05.020000 audit[2350]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.020000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc17d0a9f0 a2=0 a3=7ffc17d0a9dc items=0 ppid=2253 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 21:57:05.027000 audit[2353]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.027000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff451f1fa0 a2=0 a3=7fff451f1f8c items=0 ppid=2253 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 21:57:05.030000 audit[2354]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.030000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee4162d40 a2=0 a3=7ffee4162d2c items=0 ppid=2253 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.030000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 21:57:05.036000 audit[2356]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.036000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc57b3e410 a2=0 a3=7ffc57b3e3fc items=0 ppid=2253 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 21:57:05.038000 audit[2357]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.038000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc06a09e60 a2=0 a3=7ffc06a09e4c items=0 ppid=2253 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 21:57:05.044000 audit[2359]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.044000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd5d884b60 a2=0 a3=7ffd5d884b4c items=0 ppid=2253 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 21:57:05.048000 audit[2362]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.048000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe74e32cd0 a2=0 a3=7ffe74e32cbc items=0 ppid=2253 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 21:57:05.049000 audit[2363]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.049000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd128b61e0 a2=0 a3=7ffd128b61cc items=0 ppid=2253 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 21:57:05.067000 audit[2365]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.067000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc283f60d0 a2=0 a3=7ffc283f60bc items=0 ppid=2253 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 21:57:05.069000 audit[2366]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.069000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6a249fb0 a2=0 a3=7ffd6a249f9c items=0 ppid=2253 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 21:57:05.073000 audit[2368]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.073000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe91e790f0 a2=0 a3=7ffe91e790dc items=0 ppid=2253 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 21:57:05.081000 audit[2371]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.081000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffec17dc50 a2=0 a3=7fffec17dc3c items=0 ppid=2253 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 21:57:05.086000 audit[2374]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.086000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6599edd0 a2=0 a3=7ffc6599edbc items=0 ppid=2253 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.086000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 21:57:05.089000 audit[2375]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.089000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdaceda150 a2=0 a3=7ffdaceda13c items=0 ppid=2253 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 21:57:05.094000 audit[2377]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.094000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcbd39fc20 a2=0 a3=7ffcbd39fc0c items=0 ppid=2253 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 21:57:05.101000 audit[2380]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.101000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffceae98d10 a2=0 a3=7ffceae98cfc items=0 ppid=2253 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 21:57:05.104000 audit[2381]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.104000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe24c4570 a2=0 a3=7fffe24c455c items=0 ppid=2253 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 21:57:05.109000 audit[2383]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.109000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff455b8d90 a2=0 a3=7fff455b8d7c items=0 ppid=2253 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 21:57:05.119000 audit[2386]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.119000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc88c43510 a2=0 a3=7ffc88c434fc items=0 ppid=2253 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 21:57:05.120000 audit[2387]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.120000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff890a8130 a2=0 a3=7fff890a811c items=0 ppid=2253 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 21:57:05.125000 audit[2389]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 21:57:05.125000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdf043e830 a2=0 a3=7ffdf043e81c items=0 ppid=2253 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 21:57:05.128000 audit[2391]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 21:57:05.128000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd0437d1f0 a2=0 a3=7ffd0437d1dc items=0 ppid=2253 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.128000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:05.129000 audit[2391]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 21:57:05.129000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd0437d1f0 a2=0 a3=7ffd0437d1dc items=0 ppid=2253 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:05.129000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:05.155544 kubelet[2097]: E0212 21:57:05.155488 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:05.336804 kubelet[2097]: E0212 21:57:05.336377 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7pdj" podUID=7c92dae7-3f63-4e9c-99ad-89ea5c329db3 Feb 12 21:57:05.407124 kubelet[2097]: E0212 21:57:05.406681 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.407124 kubelet[2097]: W0212 21:57:05.406707 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.407124 kubelet[2097]: E0212 21:57:05.406732 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.407124 kubelet[2097]: E0212 21:57:05.406949 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.407124 kubelet[2097]: W0212 21:57:05.406959 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.407124 kubelet[2097]: E0212 21:57:05.406974 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.407557 kubelet[2097]: E0212 21:57:05.407157 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.407557 kubelet[2097]: W0212 21:57:05.407166 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.407557 kubelet[2097]: E0212 21:57:05.407182 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.407813 kubelet[2097]: E0212 21:57:05.407795 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.407813 kubelet[2097]: W0212 21:57:05.407809 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.407992 kubelet[2097]: E0212 21:57:05.407827 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.408067 kubelet[2097]: E0212 21:57:05.408049 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.408067 kubelet[2097]: W0212 21:57:05.408064 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.408183 kubelet[2097]: E0212 21:57:05.408080 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.408354 kubelet[2097]: E0212 21:57:05.408264 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.408354 kubelet[2097]: W0212 21:57:05.408351 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.408504 kubelet[2097]: E0212 21:57:05.408368 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.408620 kubelet[2097]: E0212 21:57:05.408604 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.408620 kubelet[2097]: W0212 21:57:05.408617 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.408739 kubelet[2097]: E0212 21:57:05.408634 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.408970 kubelet[2097]: E0212 21:57:05.408949 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.408970 kubelet[2097]: W0212 21:57:05.408963 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.409118 kubelet[2097]: E0212 21:57:05.408979 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.409186 kubelet[2097]: E0212 21:57:05.409167 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.409186 kubelet[2097]: W0212 21:57:05.409179 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.409277 kubelet[2097]: E0212 21:57:05.409196 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.409688 kubelet[2097]: E0212 21:57:05.409668 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.409688 kubelet[2097]: W0212 21:57:05.409682 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.409829 kubelet[2097]: E0212 21:57:05.409700 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.409977 kubelet[2097]: E0212 21:57:05.409959 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.409977 kubelet[2097]: W0212 21:57:05.409973 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.410198 kubelet[2097]: E0212 21:57:05.409989 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.410282 kubelet[2097]: E0212 21:57:05.410259 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.410282 kubelet[2097]: W0212 21:57:05.410273 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.410411 kubelet[2097]: E0212 21:57:05.410291 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.410506 kubelet[2097]: E0212 21:57:05.410487 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.410506 kubelet[2097]: W0212 21:57:05.410501 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.410836 kubelet[2097]: E0212 21:57:05.410517 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.411024 kubelet[2097]: E0212 21:57:05.411007 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.411024 kubelet[2097]: W0212 21:57:05.411021 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.411168 kubelet[2097]: E0212 21:57:05.411037 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.411451 kubelet[2097]: E0212 21:57:05.411433 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.411451 kubelet[2097]: W0212 21:57:05.411451 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.411667 kubelet[2097]: E0212 21:57:05.411467 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.411774 kubelet[2097]: E0212 21:57:05.411754 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.411774 kubelet[2097]: W0212 21:57:05.411769 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.411870 kubelet[2097]: E0212 21:57:05.411786 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.433214 kubelet[2097]: E0212 21:57:05.433186 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.433214 kubelet[2097]: W0212 21:57:05.433208 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.433629 kubelet[2097]: E0212 21:57:05.433234 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.433795 kubelet[2097]: E0212 21:57:05.433775 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.433795 kubelet[2097]: W0212 21:57:05.433792 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.434043 kubelet[2097]: E0212 21:57:05.433817 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.434437 kubelet[2097]: E0212 21:57:05.434414 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.434593 kubelet[2097]: W0212 21:57:05.434562 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.434653 kubelet[2097]: E0212 21:57:05.434594 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.435165 kubelet[2097]: E0212 21:57:05.435144 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.435165 kubelet[2097]: W0212 21:57:05.435159 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.435365 kubelet[2097]: E0212 21:57:05.435272 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.435481 kubelet[2097]: E0212 21:57:05.435466 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.435481 kubelet[2097]: W0212 21:57:05.435478 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.435594 kubelet[2097]: E0212 21:57:05.435499 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.435846 kubelet[2097]: E0212 21:57:05.435828 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.435846 kubelet[2097]: W0212 21:57:05.435841 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.436006 kubelet[2097]: E0212 21:57:05.435864 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.436359 kubelet[2097]: E0212 21:57:05.436340 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.436359 kubelet[2097]: W0212 21:57:05.436354 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.436471 kubelet[2097]: E0212 21:57:05.436375 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.436846 kubelet[2097]: E0212 21:57:05.436657 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.436846 kubelet[2097]: W0212 21:57:05.436671 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.436846 kubelet[2097]: E0212 21:57:05.436702 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.437219 kubelet[2097]: E0212 21:57:05.437201 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.437219 kubelet[2097]: W0212 21:57:05.437215 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.437510 kubelet[2097]: E0212 21:57:05.437406 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.437715 kubelet[2097]: E0212 21:57:05.437695 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.437715 kubelet[2097]: W0212 21:57:05.437711 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.437840 kubelet[2097]: E0212 21:57:05.437735 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.438236 kubelet[2097]: E0212 21:57:05.438217 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.438236 kubelet[2097]: W0212 21:57:05.438231 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.438367 kubelet[2097]: E0212 21:57:05.438262 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.438536 kubelet[2097]: E0212 21:57:05.438512 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:05.438703 kubelet[2097]: W0212 21:57:05.438682 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:05.438772 kubelet[2097]: E0212 21:57:05.438707 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:05.834743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount553113241.mount: Deactivated successfully. Feb 12 21:57:06.156013 kubelet[2097]: E0212 21:57:06.155888 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:06.419148 kubelet[2097]: E0212 21:57:06.418794 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.419148 kubelet[2097]: W0212 21:57:06.418821 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.419148 kubelet[2097]: E0212 21:57:06.418847 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.419148 kubelet[2097]: E0212 21:57:06.419113 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.419148 kubelet[2097]: W0212 21:57:06.419123 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.419148 kubelet[2097]: E0212 21:57:06.419149 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.419661 kubelet[2097]: E0212 21:57:06.419445 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.419661 kubelet[2097]: W0212 21:57:06.419455 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.419661 kubelet[2097]: E0212 21:57:06.419471 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.419813 kubelet[2097]: E0212 21:57:06.419695 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.419813 kubelet[2097]: W0212 21:57:06.419704 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.419813 kubelet[2097]: E0212 21:57:06.419718 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.420113 kubelet[2097]: E0212 21:57:06.419981 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.420113 kubelet[2097]: W0212 21:57:06.419992 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.420113 kubelet[2097]: E0212 21:57:06.420007 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.420263 kubelet[2097]: E0212 21:57:06.420238 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.420263 kubelet[2097]: W0212 21:57:06.420247 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.420263 kubelet[2097]: E0212 21:57:06.420262 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.420638 kubelet[2097]: E0212 21:57:06.420611 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.420638 kubelet[2097]: W0212 21:57:06.420625 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.421289 kubelet[2097]: E0212 21:57:06.420641 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.421367 kubelet[2097]: E0212 21:57:06.421322 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.421367 kubelet[2097]: W0212 21:57:06.421333 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.421367 kubelet[2097]: E0212 21:57:06.421350 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.421556 kubelet[2097]: E0212 21:57:06.421535 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.421556 kubelet[2097]: W0212 21:57:06.421552 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.421675 kubelet[2097]: E0212 21:57:06.421567 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.423574 kubelet[2097]: E0212 21:57:06.421825 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.423574 kubelet[2097]: W0212 21:57:06.421836 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.423574 kubelet[2097]: E0212 21:57:06.421892 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.423574 kubelet[2097]: E0212 21:57:06.422345 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.423574 kubelet[2097]: W0212 21:57:06.422356 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.423574 kubelet[2097]: E0212 21:57:06.422373 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.423574 kubelet[2097]: E0212 21:57:06.422570 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.423574 kubelet[2097]: W0212 21:57:06.422578 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.423574 kubelet[2097]: E0212 21:57:06.422592 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.423574 kubelet[2097]: E0212 21:57:06.422795 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.423980 kubelet[2097]: W0212 21:57:06.422803 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.423980 kubelet[2097]: E0212 21:57:06.422815 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.423980 kubelet[2097]: E0212 21:57:06.423041 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.423980 kubelet[2097]: W0212 21:57:06.423051 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.423980 kubelet[2097]: E0212 21:57:06.423073 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.423980 kubelet[2097]: E0212 21:57:06.423269 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.423980 kubelet[2097]: W0212 21:57:06.423278 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.423980 kubelet[2097]: E0212 21:57:06.423302 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.423980 kubelet[2097]: E0212 21:57:06.423495 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.423980 kubelet[2097]: W0212 21:57:06.423504 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.424226 kubelet[2097]: E0212 21:57:06.423518 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.443987 kubelet[2097]: E0212 21:57:06.443956 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.443987 kubelet[2097]: W0212 21:57:06.443979 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.443987 kubelet[2097]: E0212 21:57:06.444006 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.444323 kubelet[2097]: E0212 21:57:06.444301 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.444323 kubelet[2097]: W0212 21:57:06.444316 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.444441 kubelet[2097]: E0212 21:57:06.444337 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.444611 kubelet[2097]: E0212 21:57:06.444592 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.444611 kubelet[2097]: W0212 21:57:06.444606 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.444737 kubelet[2097]: E0212 21:57:06.444628 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.445203 kubelet[2097]: E0212 21:57:06.445185 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.445203 kubelet[2097]: W0212 21:57:06.445202 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.445324 kubelet[2097]: E0212 21:57:06.445224 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.445484 kubelet[2097]: E0212 21:57:06.445459 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.445484 kubelet[2097]: W0212 21:57:06.445474 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.445872 kubelet[2097]: E0212 21:57:06.445651 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.445872 kubelet[2097]: E0212 21:57:06.445680 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.445872 kubelet[2097]: W0212 21:57:06.445688 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.445872 kubelet[2097]: E0212 21:57:06.445702 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.446190 kubelet[2097]: E0212 21:57:06.446173 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.446190 kubelet[2097]: W0212 21:57:06.446187 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.446305 kubelet[2097]: E0212 21:57:06.446210 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.446643 kubelet[2097]: E0212 21:57:06.446625 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.446643 kubelet[2097]: W0212 21:57:06.446640 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.446832 kubelet[2097]: E0212 21:57:06.446662 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.447036 kubelet[2097]: E0212 21:57:06.447020 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.447036 kubelet[2097]: W0212 21:57:06.447033 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.447272 kubelet[2097]: E0212 21:57:06.447050 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.447375 kubelet[2097]: E0212 21:57:06.447360 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.447375 kubelet[2097]: W0212 21:57:06.447373 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.447466 kubelet[2097]: E0212 21:57:06.447392 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.447625 kubelet[2097]: E0212 21:57:06.447608 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.447625 kubelet[2097]: W0212 21:57:06.447621 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.447730 kubelet[2097]: E0212 21:57:06.447637 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.448063 kubelet[2097]: E0212 21:57:06.448047 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 21:57:06.448063 kubelet[2097]: W0212 21:57:06.448063 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 21:57:06.448148 kubelet[2097]: E0212 21:57:06.448078 2097 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 21:57:06.866562 env[1644]: time="2024-02-12T21:57:06.866509245Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:06.869591 env[1644]: time="2024-02-12T21:57:06.869547279Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:06.873441 env[1644]: time="2024-02-12T21:57:06.873401226Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:06.876093 env[1644]: time="2024-02-12T21:57:06.876053243Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:06.877644 env[1644]: time="2024-02-12T21:57:06.877599512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 21:57:06.880288 env[1644]: time="2024-02-12T21:57:06.880253233Z" level=info msg="CreateContainer within sandbox \"82617494e6abc6301f3ae3e71bc252cf109fcc3ddb4c9cfbb3ecc31a3220fb64\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 21:57:06.901536 env[1644]: time="2024-02-12T21:57:06.901488027Z" level=info msg="CreateContainer within sandbox \"82617494e6abc6301f3ae3e71bc252cf109fcc3ddb4c9cfbb3ecc31a3220fb64\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6a0f0288c8a8d75103d994db62f786f27dc67534f429c1c3b3db99bee6bb3cfe\"" Feb 12 21:57:06.902283 env[1644]: time="2024-02-12T21:57:06.902245227Z" level=info msg="StartContainer for \"6a0f0288c8a8d75103d994db62f786f27dc67534f429c1c3b3db99bee6bb3cfe\"" Feb 12 21:57:06.937860 systemd[1]: run-containerd-runc-k8s.io-6a0f0288c8a8d75103d994db62f786f27dc67534f429c1c3b3db99bee6bb3cfe-runc.yIGPxH.mount: Deactivated successfully. Feb 12 21:57:06.942377 systemd[1]: Started cri-containerd-6a0f0288c8a8d75103d994db62f786f27dc67534f429c1c3b3db99bee6bb3cfe.scope. Feb 12 21:57:06.962000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.962000 audit[2456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f31254f68f8 items=0 ppid=2155 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:06.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661306630323838633861386437353130336439393464623632663738 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit: BPF prog-id=81 op=LOAD Feb 12 21:57:06.963000 audit[2456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00017cb38 items=0 ppid=2155 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:06.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661306630323838633861386437353130336439393464623632663738 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.963000 audit: BPF prog-id=82 op=LOAD Feb 12 21:57:06.963000 audit[2456]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00017cb88 items=0 ppid=2155 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:06.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661306630323838633861386437353130336439393464623632663738 Feb 12 21:57:06.964000 audit: BPF prog-id=82 op=UNLOAD Feb 12 21:57:06.964000 audit: BPF prog-id=81 op=UNLOAD Feb 12 21:57:06.964000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.964000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.964000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.964000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.964000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.964000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.964000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.964000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.964000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.964000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:06.964000 audit: BPF prog-id=83 op=LOAD Feb 12 21:57:06.964000 audit[2456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00017cc18 items=0 ppid=2155 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:06.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661306630323838633861386437353130336439393464623632663738 Feb 12 21:57:06.990192 env[1644]: time="2024-02-12T21:57:06.990131424Z" level=info msg="StartContainer for \"6a0f0288c8a8d75103d994db62f786f27dc67534f429c1c3b3db99bee6bb3cfe\" returns successfully" Feb 12 21:57:06.994646 systemd[1]: cri-containerd-6a0f0288c8a8d75103d994db62f786f27dc67534f429c1c3b3db99bee6bb3cfe.scope: Deactivated successfully. Feb 12 21:57:06.996000 audit: BPF prog-id=83 op=UNLOAD Feb 12 21:57:07.156430 kubelet[2097]: E0212 21:57:07.156235 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:07.165490 env[1644]: time="2024-02-12T21:57:07.165343306Z" level=info msg="shim disconnected" id=6a0f0288c8a8d75103d994db62f786f27dc67534f429c1c3b3db99bee6bb3cfe Feb 12 21:57:07.165657 env[1644]: time="2024-02-12T21:57:07.165502651Z" level=warning msg="cleaning up after shim disconnected" id=6a0f0288c8a8d75103d994db62f786f27dc67534f429c1c3b3db99bee6bb3cfe namespace=k8s.io Feb 12 21:57:07.165657 env[1644]: time="2024-02-12T21:57:07.165519801Z" level=info msg="cleaning up dead shim" Feb 12 21:57:07.181967 env[1644]: time="2024-02-12T21:57:07.181892412Z" level=warning msg="cleanup warnings time=\"2024-02-12T21:57:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2495 runtime=io.containerd.runc.v2\n" Feb 12 21:57:07.324000 audit[2508]: NETFILTER_CFG table=filter:65 family=2 entries=8 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:07.324000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffda7500720 a2=0 a3=7ffda750070c items=0 ppid=2253 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:07.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:07.327000 audit[2508]: NETFILTER_CFG table=nat:66 family=2 entries=44 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:07.327000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffda7500720 a2=0 a3=7ffda750070c items=0 ppid=2253 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:07.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:07.341935 kubelet[2097]: E0212 21:57:07.341887 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7pdj" podUID=7c92dae7-3f63-4e9c-99ad-89ea5c329db3 Feb 12 21:57:07.348000 audit[2510]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:07.348000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffee1cb5d20 a2=0 a3=7ffee1cb5d0c items=0 ppid=2253 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:07.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:07.354000 audit[2510]: NETFILTER_CFG table=nat:68 family=2 entries=56 op=nft_register_chain pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:07.354000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffee1cb5d20 a2=0 a3=7ffee1cb5d0c items=0 ppid=2253 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:07.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:07.379143 env[1644]: time="2024-02-12T21:57:07.379102095Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 21:57:07.407093 kubelet[2097]: I0212 21:57:07.406822 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-92jsq" podStartSLOduration=7.298675718 podCreationTimestamp="2024-02-12 21:56:58 +0000 UTC" firstStartedPulling="2024-02-12 21:57:02.329130243 +0000 UTC m=+5.554360369" lastFinishedPulling="2024-02-12 21:57:04.437203568 +0000 UTC m=+7.662433711" observedRunningTime="2024-02-12 21:57:05.379057603 +0000 UTC m=+8.604287753" watchObservedRunningTime="2024-02-12 21:57:07.40674906 +0000 UTC m=+10.631979208" Feb 12 21:57:07.893861 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6a0f0288c8a8d75103d994db62f786f27dc67534f429c1c3b3db99bee6bb3cfe-rootfs.mount: Deactivated successfully. Feb 12 21:57:08.157126 kubelet[2097]: E0212 21:57:08.156800 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:08.592494 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4000615865.mount: Deactivated successfully. Feb 12 21:57:09.157745 kubelet[2097]: E0212 21:57:09.157705 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:09.337162 kubelet[2097]: E0212 21:57:09.337129 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7pdj" podUID=7c92dae7-3f63-4e9c-99ad-89ea5c329db3 Feb 12 21:57:10.158638 kubelet[2097]: E0212 21:57:10.158597 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:11.158952 kubelet[2097]: E0212 21:57:11.158914 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:11.340188 kubelet[2097]: E0212 21:57:11.340149 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7pdj" podUID=7c92dae7-3f63-4e9c-99ad-89ea5c329db3 Feb 12 21:57:12.159872 kubelet[2097]: E0212 21:57:12.159779 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:13.020104 env[1644]: time="2024-02-12T21:57:13.020045878Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:13.023184 env[1644]: time="2024-02-12T21:57:13.023085728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:13.025603 env[1644]: time="2024-02-12T21:57:13.025563141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:13.027856 env[1644]: time="2024-02-12T21:57:13.027816446Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:13.028709 env[1644]: time="2024-02-12T21:57:13.028670797Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 21:57:13.032188 env[1644]: time="2024-02-12T21:57:13.032143621Z" level=info msg="CreateContainer within sandbox \"82617494e6abc6301f3ae3e71bc252cf109fcc3ddb4c9cfbb3ecc31a3220fb64\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 21:57:13.054718 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3806501674.mount: Deactivated successfully. Feb 12 21:57:13.065355 env[1644]: time="2024-02-12T21:57:13.065303592Z" level=info msg="CreateContainer within sandbox \"82617494e6abc6301f3ae3e71bc252cf109fcc3ddb4c9cfbb3ecc31a3220fb64\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ea66b3fa840c2b07969767d28de9bd15a00d27ff3f8462e27f90df46f0edd5b5\"" Feb 12 21:57:13.066209 env[1644]: time="2024-02-12T21:57:13.066175088Z" level=info msg="StartContainer for \"ea66b3fa840c2b07969767d28de9bd15a00d27ff3f8462e27f90df46f0edd5b5\"" Feb 12 21:57:13.110155 systemd[1]: Started cri-containerd-ea66b3fa840c2b07969767d28de9bd15a00d27ff3f8462e27f90df46f0edd5b5.scope. Feb 12 21:57:13.135204 kernel: kauditd_printk_skb: 242 callbacks suppressed Feb 12 21:57:13.135335 kernel: audit: type=1400 audit(1707775033.127:718): avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.127000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.144128 kernel: audit: type=1300 audit(1707775033.127:718): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fcee81b25b8 items=0 ppid=2155 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:13.127000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fcee81b25b8 items=0 ppid=2155 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:13.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561363662336661383430633262303739363937363764323864653962 Feb 12 21:57:13.150805 kernel: audit: type=1327 audit(1707775033.127:718): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561363662336661383430633262303739363937363764323864653962 Feb 12 21:57:13.150975 kernel: audit: type=1400 audit(1707775033.140:719): avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.140000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.140000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.163785 kernel: audit: type=1400 audit(1707775033.140:719): avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.166592 kubelet[2097]: E0212 21:57:13.166508 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:13.140000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.171964 kernel: audit: type=1400 audit(1707775033.140:719): avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.140000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.177949 kernel: audit: type=1400 audit(1707775033.140:719): avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.140000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.184079 kernel: audit: type=1400 audit(1707775033.140:719): avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.140000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.190131 env[1644]: time="2024-02-12T21:57:13.184348936Z" level=info msg="StartContainer for \"ea66b3fa840c2b07969767d28de9bd15a00d27ff3f8462e27f90df46f0edd5b5\" returns successfully" Feb 12 21:57:13.140000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.196051 kernel: audit: type=1400 audit(1707775033.140:719): avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.196288 kernel: audit: type=1400 audit(1707775033.140:719): avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.140000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.140000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.140000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.140000 audit: BPF prog-id=84 op=LOAD Feb 12 21:57:13.140000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00036bea8 items=0 ppid=2155 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:13.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561363662336661383430633262303739363937363764323864653962 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit: BPF prog-id=85 op=LOAD Feb 12 21:57:13.143000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00036bef8 items=0 ppid=2155 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:13.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561363662336661383430633262303739363937363764323864653962 Feb 12 21:57:13.143000 audit: BPF prog-id=85 op=UNLOAD Feb 12 21:57:13.143000 audit: BPF prog-id=84 op=UNLOAD Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:13.143000 audit: BPF prog-id=86 op=LOAD Feb 12 21:57:13.143000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00036bf88 items=0 ppid=2155 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:13.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561363662336661383430633262303739363937363764323864653962 Feb 12 21:57:13.338770 kubelet[2097]: E0212 21:57:13.338733 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7pdj" podUID=7c92dae7-3f63-4e9c-99ad-89ea5c329db3 Feb 12 21:57:14.102370 env[1644]: time="2024-02-12T21:57:14.102242769Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 21:57:14.105682 systemd[1]: cri-containerd-ea66b3fa840c2b07969767d28de9bd15a00d27ff3f8462e27f90df46f0edd5b5.scope: Deactivated successfully. Feb 12 21:57:14.108000 audit: BPF prog-id=86 op=UNLOAD Feb 12 21:57:14.139334 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ea66b3fa840c2b07969767d28de9bd15a00d27ff3f8462e27f90df46f0edd5b5-rootfs.mount: Deactivated successfully. Feb 12 21:57:14.167572 kubelet[2097]: E0212 21:57:14.167535 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:14.196793 kubelet[2097]: I0212 21:57:14.196570 2097 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 21:57:14.787398 env[1644]: time="2024-02-12T21:57:14.787335809Z" level=info msg="shim disconnected" id=ea66b3fa840c2b07969767d28de9bd15a00d27ff3f8462e27f90df46f0edd5b5 Feb 12 21:57:14.787398 env[1644]: time="2024-02-12T21:57:14.787398757Z" level=warning msg="cleaning up after shim disconnected" id=ea66b3fa840c2b07969767d28de9bd15a00d27ff3f8462e27f90df46f0edd5b5 namespace=k8s.io Feb 12 21:57:14.787750 env[1644]: time="2024-02-12T21:57:14.787410970Z" level=info msg="cleaning up dead shim" Feb 12 21:57:14.796487 env[1644]: time="2024-02-12T21:57:14.796428066Z" level=warning msg="cleanup warnings time=\"2024-02-12T21:57:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2570 runtime=io.containerd.runc.v2\n" Feb 12 21:57:15.168600 kubelet[2097]: E0212 21:57:15.168549 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:15.341118 systemd[1]: Created slice kubepods-besteffort-pod7c92dae7_3f63_4e9c_99ad_89ea5c329db3.slice. Feb 12 21:57:15.345197 env[1644]: time="2024-02-12T21:57:15.345153300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7pdj,Uid:7c92dae7-3f63-4e9c-99ad-89ea5c329db3,Namespace:calico-system,Attempt:0,}" Feb 12 21:57:15.407344 env[1644]: time="2024-02-12T21:57:15.407290837Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 21:57:15.447172 env[1644]: time="2024-02-12T21:57:15.443645190Z" level=error msg="Failed to destroy network for sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:57:15.447172 env[1644]: time="2024-02-12T21:57:15.446711109Z" level=error msg="encountered an error cleaning up failed sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:57:15.447172 env[1644]: time="2024-02-12T21:57:15.446793533Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7pdj,Uid:7c92dae7-3f63-4e9c-99ad-89ea5c329db3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:57:15.445807 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f-shm.mount: Deactivated successfully. Feb 12 21:57:15.447718 kubelet[2097]: E0212 21:57:15.447693 2097 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:57:15.447881 kubelet[2097]: E0212 21:57:15.447757 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m7pdj" Feb 12 21:57:15.447881 kubelet[2097]: E0212 21:57:15.447794 2097 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m7pdj" Feb 12 21:57:15.448129 kubelet[2097]: E0212 21:57:15.447932 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-m7pdj_calico-system(7c92dae7-3f63-4e9c-99ad-89ea5c329db3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-m7pdj_calico-system(7c92dae7-3f63-4e9c-99ad-89ea5c329db3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m7pdj" podUID=7c92dae7-3f63-4e9c-99ad-89ea5c329db3 Feb 12 21:57:16.169658 kubelet[2097]: E0212 21:57:16.169606 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:16.409675 kubelet[2097]: I0212 21:57:16.409214 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:16.410648 env[1644]: time="2024-02-12T21:57:16.410616867Z" level=info msg="StopPodSandbox for \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\"" Feb 12 21:57:16.446451 env[1644]: time="2024-02-12T21:57:16.445975730Z" level=error msg="StopPodSandbox for \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\" failed" error="failed to destroy network for sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:57:16.446585 kubelet[2097]: E0212 21:57:16.446394 2097 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:16.446585 kubelet[2097]: E0212 21:57:16.446474 2097 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f} Feb 12 21:57:16.446585 kubelet[2097]: E0212 21:57:16.446538 2097 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7c92dae7-3f63-4e9c-99ad-89ea5c329db3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 21:57:16.446585 kubelet[2097]: E0212 21:57:16.446580 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7c92dae7-3f63-4e9c-99ad-89ea5c329db3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m7pdj" podUID=7c92dae7-3f63-4e9c-99ad-89ea5c329db3 Feb 12 21:57:17.149731 kubelet[2097]: E0212 21:57:17.149694 2097 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:17.170141 kubelet[2097]: E0212 21:57:17.170081 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:18.143469 kubelet[2097]: I0212 21:57:18.143429 2097 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:57:18.152126 systemd[1]: Created slice kubepods-besteffort-pod5b680462_5ee6_4663_8f1c_65742f5450cf.slice. Feb 12 21:57:18.171253 kubelet[2097]: E0212 21:57:18.171213 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:18.234400 kubelet[2097]: I0212 21:57:18.233974 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gs42s\" (UniqueName: \"kubernetes.io/projected/5b680462-5ee6-4663-8f1c-65742f5450cf-kube-api-access-gs42s\") pod \"nginx-deployment-845c78c8b9-bn8gf\" (UID: \"5b680462-5ee6-4663-8f1c-65742f5450cf\") " pod="default/nginx-deployment-845c78c8b9-bn8gf" Feb 12 21:57:18.460572 env[1644]: time="2024-02-12T21:57:18.459641666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-bn8gf,Uid:5b680462-5ee6-4663-8f1c-65742f5450cf,Namespace:default,Attempt:0,}" Feb 12 21:57:18.682761 env[1644]: time="2024-02-12T21:57:18.682690690Z" level=error msg="Failed to destroy network for sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:57:18.689302 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79-shm.mount: Deactivated successfully. Feb 12 21:57:18.691317 env[1644]: time="2024-02-12T21:57:18.691257178Z" level=error msg="encountered an error cleaning up failed sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:57:18.691500 env[1644]: time="2024-02-12T21:57:18.691466421Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-bn8gf,Uid:5b680462-5ee6-4663-8f1c-65742f5450cf,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:57:18.691927 kubelet[2097]: E0212 21:57:18.691844 2097 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:57:18.692491 kubelet[2097]: E0212 21:57:18.691915 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-bn8gf" Feb 12 21:57:18.692491 kubelet[2097]: E0212 21:57:18.692102 2097 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-bn8gf" Feb 12 21:57:18.692491 kubelet[2097]: E0212 21:57:18.692248 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-bn8gf_default(5b680462-5ee6-4663-8f1c-65742f5450cf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-bn8gf_default(5b680462-5ee6-4663-8f1c-65742f5450cf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-bn8gf" podUID=5b680462-5ee6-4663-8f1c-65742f5450cf Feb 12 21:57:19.171884 kubelet[2097]: E0212 21:57:19.171847 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:19.417928 kubelet[2097]: I0212 21:57:19.417799 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:19.419052 env[1644]: time="2024-02-12T21:57:19.419005975Z" level=info msg="StopPodSandbox for \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\"" Feb 12 21:57:19.489285 env[1644]: time="2024-02-12T21:57:19.488666910Z" level=error msg="StopPodSandbox for \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\" failed" error="failed to destroy network for sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 21:57:19.490679 kubelet[2097]: E0212 21:57:19.490147 2097 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:19.490679 kubelet[2097]: E0212 21:57:19.490502 2097 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79} Feb 12 21:57:19.490679 kubelet[2097]: E0212 21:57:19.490581 2097 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5b680462-5ee6-4663-8f1c-65742f5450cf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 21:57:19.490679 kubelet[2097]: E0212 21:57:19.490635 2097 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5b680462-5ee6-4663-8f1c-65742f5450cf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-bn8gf" podUID=5b680462-5ee6-4663-8f1c-65742f5450cf Feb 12 21:57:20.154506 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 21:57:20.154745 kernel: audit: type=1131 audit(1707775040.145:725): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:57:20.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:57:20.146491 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 12 21:57:20.171000 audit: BPF prog-id=57 op=UNLOAD Feb 12 21:57:20.172608 kubelet[2097]: E0212 21:57:20.172559 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:20.171000 audit: BPF prog-id=56 op=UNLOAD Feb 12 21:57:20.175167 kernel: audit: type=1334 audit(1707775040.171:726): prog-id=57 op=UNLOAD Feb 12 21:57:20.175242 kernel: audit: type=1334 audit(1707775040.171:727): prog-id=56 op=UNLOAD Feb 12 21:57:20.175274 kernel: audit: type=1334 audit(1707775040.171:728): prog-id=55 op=UNLOAD Feb 12 21:57:20.171000 audit: BPF prog-id=55 op=UNLOAD Feb 12 21:57:21.173711 kubelet[2097]: E0212 21:57:21.173673 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:22.173852 kubelet[2097]: E0212 21:57:22.173755 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:22.913982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1637321551.mount: Deactivated successfully. Feb 12 21:57:23.010896 env[1644]: time="2024-02-12T21:57:23.010841205Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:23.014631 env[1644]: time="2024-02-12T21:57:23.014586057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:23.018059 env[1644]: time="2024-02-12T21:57:23.017484534Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:23.020572 env[1644]: time="2024-02-12T21:57:23.020533023Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:23.021458 env[1644]: time="2024-02-12T21:57:23.021422771Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 21:57:23.057320 env[1644]: time="2024-02-12T21:57:23.057276241Z" level=info msg="CreateContainer within sandbox \"82617494e6abc6301f3ae3e71bc252cf109fcc3ddb4c9cfbb3ecc31a3220fb64\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 21:57:23.079401 env[1644]: time="2024-02-12T21:57:23.079358724Z" level=info msg="CreateContainer within sandbox \"82617494e6abc6301f3ae3e71bc252cf109fcc3ddb4c9cfbb3ecc31a3220fb64\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"dd7c90475d86d91a140d3b4c9e7e803ec496dd5cab5496a4478a5714c2e063af\"" Feb 12 21:57:23.080302 env[1644]: time="2024-02-12T21:57:23.080271061Z" level=info msg="StartContainer for \"dd7c90475d86d91a140d3b4c9e7e803ec496dd5cab5496a4478a5714c2e063af\"" Feb 12 21:57:23.108460 systemd[1]: Started cri-containerd-dd7c90475d86d91a140d3b4c9e7e803ec496dd5cab5496a4478a5714c2e063af.scope. Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f2e482c4c38 items=0 ppid=2155 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:23.151341 kernel: audit: type=1400 audit(1707775043.139:729): avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.151451 kernel: audit: type=1300 audit(1707775043.139:729): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f2e482c4c38 items=0 ppid=2155 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:23.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464376339303437356438366439316131343064336234633965376538 Feb 12 21:57:23.157474 kernel: audit: type=1327 audit(1707775043.139:729): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464376339303437356438366439316131343064336234633965376538 Feb 12 21:57:23.163437 kernel: audit: type=1400 audit(1707775043.139:730): avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.171144 kernel: audit: type=1400 audit(1707775043.139:730): avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.176247 kubelet[2097]: E0212 21:57:23.176050 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:23.178134 kernel: audit: type=1400 audit(1707775043.139:730): avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.139000 audit: BPF prog-id=87 op=LOAD Feb 12 21:57:23.139000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00030d9f8 items=0 ppid=2155 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:23.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464376339303437356438366439316131343064336234633965376538 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit: BPF prog-id=88 op=LOAD Feb 12 21:57:23.143000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00030da48 items=0 ppid=2155 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:23.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464376339303437356438366439316131343064336234633965376538 Feb 12 21:57:23.143000 audit: BPF prog-id=88 op=UNLOAD Feb 12 21:57:23.143000 audit: BPF prog-id=87 op=UNLOAD Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:23.143000 audit: BPF prog-id=89 op=LOAD Feb 12 21:57:23.143000 audit[2700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00030dad8 items=0 ppid=2155 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:23.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464376339303437356438366439316131343064336234633965376538 Feb 12 21:57:23.180495 env[1644]: time="2024-02-12T21:57:23.180422152Z" level=info msg="StartContainer for \"dd7c90475d86d91a140d3b4c9e7e803ec496dd5cab5496a4478a5714c2e063af\" returns successfully" Feb 12 21:57:23.322307 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 21:57:23.322452 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 21:57:23.454553 kubelet[2097]: I0212 21:57:23.451584 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-85fkn" podStartSLOduration=4.761335536 podCreationTimestamp="2024-02-12 21:56:58 +0000 UTC" firstStartedPulling="2024-02-12 21:57:02.331699677 +0000 UTC m=+5.556929809" lastFinishedPulling="2024-02-12 21:57:23.021896017 +0000 UTC m=+26.247126149" observedRunningTime="2024-02-12 21:57:23.451197442 +0000 UTC m=+26.676427591" watchObservedRunningTime="2024-02-12 21:57:23.451531876 +0000 UTC m=+26.676762019" Feb 12 21:57:24.176613 kubelet[2097]: E0212 21:57:24.176566 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:24.463073 systemd[1]: run-containerd-runc-k8s.io-dd7c90475d86d91a140d3b4c9e7e803ec496dd5cab5496a4478a5714c2e063af-runc.UMOTtt.mount: Deactivated successfully. Feb 12 21:57:24.877000 audit[2837]: AVC avc: denied { write } for pid=2837 comm="tee" name="fd" dev="proc" ino=19924 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:57:24.885000 audit[2843]: AVC avc: denied { write } for pid=2843 comm="tee" name="fd" dev="proc" ino=20570 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:57:24.885000 audit[2843]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe58f3d984 a2=241 a3=1b6 items=1 ppid=2814 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:24.885000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 21:57:24.885000 audit: PATH item=0 name="/dev/fd/63" inode=20564 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:57:24.885000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:57:24.877000 audit[2837]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb7a05986 a2=241 a3=1b6 items=1 ppid=2818 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:24.877000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 21:57:24.877000 audit: PATH item=0 name="/dev/fd/63" inode=19914 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:57:24.877000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:57:24.896000 audit[2846]: AVC avc: denied { write } for pid=2846 comm="tee" name="fd" dev="proc" ino=19935 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:57:24.897000 audit[2851]: AVC avc: denied { write } for pid=2851 comm="tee" name="fd" dev="proc" ino=20579 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:57:24.897000 audit[2851]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff680b9984 a2=241 a3=1b6 items=1 ppid=2812 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:24.897000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 21:57:24.897000 audit: PATH item=0 name="/dev/fd/63" inode=20567 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:57:24.897000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:57:24.899000 audit[2854]: AVC avc: denied { write } for pid=2854 comm="tee" name="fd" dev="proc" ino=20583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:57:24.899000 audit[2854]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc9702974 a2=241 a3=1b6 items=1 ppid=2821 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:24.899000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 21:57:24.899000 audit: PATH item=0 name="/dev/fd/63" inode=19927 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:57:24.899000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:57:24.896000 audit[2846]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe39a4d984 a2=241 a3=1b6 items=1 ppid=2810 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:24.896000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 21:57:24.896000 audit: PATH item=0 name="/dev/fd/63" inode=19921 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:57:24.896000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:57:24.908000 audit[2872]: AVC avc: denied { write } for pid=2872 comm="tee" name="fd" dev="proc" ino=20593 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:57:24.908000 audit[2872]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc13d1985 a2=241 a3=1b6 items=1 ppid=2819 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:24.908000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 21:57:24.908000 audit: PATH item=0 name="/dev/fd/63" inode=19929 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:57:24.908000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:57:24.921000 audit[2880]: AVC avc: denied { write } for pid=2880 comm="tee" name="fd" dev="proc" ino=19945 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 21:57:24.921000 audit[2880]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda2cfb975 a2=241 a3=1b6 items=1 ppid=2816 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:24.921000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 21:57:24.921000 audit: PATH item=0 name="/dev/fd/63" inode=19942 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:57:24.921000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 21:57:25.177076 kubelet[2097]: E0212 21:57:25.176970 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:25.254934 kernel: Initializing XFRM netlink socket Feb 12 21:57:25.418337 (udev-worker)[2734]: Network interface NamePolicy= disabled on kernel command line. Feb 12 21:57:25.419199 (udev-worker)[2732]: Network interface NamePolicy= disabled on kernel command line. Feb 12 21:57:25.429208 kernel: kauditd_printk_skb: 72 callbacks suppressed Feb 12 21:57:25.429346 kernel: audit: type=1400 audit(1707775045.422:742): avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.422000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.422000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.435928 kernel: audit: type=1400 audit(1707775045.422:742): avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.441930 kernel: audit: type=1400 audit(1707775045.422:742): avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.422000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.422000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.422000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.451223 kernel: audit: type=1400 audit(1707775045.422:742): avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.451383 kernel: audit: type=1400 audit(1707775045.422:742): avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.451415 kernel: audit: type=1400 audit(1707775045.422:742): avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.422000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.422000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.463935 kernel: audit: type=1400 audit(1707775045.422:742): avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.422000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.468965 kernel: audit: type=1400 audit(1707775045.422:742): avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.422000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.422000 audit: BPF prog-id=90 op=LOAD Feb 12 21:57:25.474958 kernel: audit: type=1400 audit(1707775045.422:742): avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.475017 kernel: audit: type=1334 audit(1707775045.422:742): prog-id=90 op=LOAD Feb 12 21:57:25.422000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe704b2d0 a2=70 a3=7f1acfa9b000 items=0 ppid=2815 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:57:25.434000 audit: BPF prog-id=90 op=UNLOAD Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit: BPF prog-id=91 op=LOAD Feb 12 21:57:25.434000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe704b2d0 a2=70 a3=6e items=0 ppid=2815 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.434000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:57:25.434000 audit: BPF prog-id=91 op=UNLOAD Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffe704b280 a2=70 a3=7fffe704b2d0 items=0 ppid=2815 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.434000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.434000 audit: BPF prog-id=92 op=LOAD Feb 12 21:57:25.434000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffe704b260 a2=70 a3=7fffe704b2d0 items=0 ppid=2815 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.434000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:57:25.435000 audit: BPF prog-id=92 op=UNLOAD Feb 12 21:57:25.435000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.435000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe704b340 a2=70 a3=0 items=0 ppid=2815 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.435000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:57:25.435000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.435000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe704b330 a2=70 a3=0 items=0 ppid=2815 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.435000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:57:25.435000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.435000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fffe704b370 a2=70 a3=0 items=0 ppid=2815 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.435000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:57:25.436000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.436000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.436000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.436000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.436000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.436000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.436000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.436000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.436000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.436000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.436000 audit: BPF prog-id=93 op=LOAD Feb 12 21:57:25.436000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffe704b290 a2=70 a3=ffffffff items=0 ppid=2815 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.436000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 21:57:25.476000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.476000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd94359c00 a2=70 a3=fff80800 items=0 ppid=2815 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.476000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 21:57:25.476000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:25.476000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd94359ad0 a2=70 a3=3 items=0 ppid=2815 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.476000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 21:57:25.483000 audit: BPF prog-id=93 op=UNLOAD Feb 12 21:57:25.551000 audit[2972]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:57:25.551000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffdaef69840 a2=0 a3=7ffdaef6982c items=0 ppid=2815 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.551000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:57:25.560000 audit[2971]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:57:25.560000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc2e43ce60 a2=0 a3=55fc34aa5000 items=0 ppid=2815 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.560000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:57:25.564000 audit[2973]: NETFILTER_CFG table=nat:71 family=2 entries=16 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:57:25.564000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc0f3fc9c0 a2=0 a3=56388bfb5000 items=0 ppid=2815 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.564000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:57:25.565000 audit[2975]: NETFILTER_CFG table=filter:72 family=2 entries=39 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:57:25.565000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffec2088400 a2=0 a3=561e2ebab000 items=0 ppid=2815 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:25.565000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:57:26.177801 kubelet[2097]: E0212 21:57:26.177754 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:26.293649 systemd-networkd[1456]: vxlan.calico: Link UP Feb 12 21:57:26.293659 systemd-networkd[1456]: vxlan.calico: Gained carrier Feb 12 21:57:27.177934 kubelet[2097]: E0212 21:57:27.177886 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:27.337186 env[1644]: time="2024-02-12T21:57:27.337137381Z" level=info msg="StopPodSandbox for \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\"" Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.425 [INFO][3003] k8s.go 578: Cleaning up netns ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.425 [INFO][3003] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" iface="eth0" netns="/var/run/netns/cni-8cb9c36f-22fc-702f-e6b9-7674a3e0e493" Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.426 [INFO][3003] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" iface="eth0" netns="/var/run/netns/cni-8cb9c36f-22fc-702f-e6b9-7674a3e0e493" Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.427 [INFO][3003] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" iface="eth0" netns="/var/run/netns/cni-8cb9c36f-22fc-702f-e6b9-7674a3e0e493" Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.427 [INFO][3003] k8s.go 585: Releasing IP address(es) ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.427 [INFO][3003] utils.go 188: Calico CNI releasing IP address ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.522 [INFO][3009] ipam_plugin.go 415: Releasing address using handleID ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" HandleID="k8s-pod-network.3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.522 [INFO][3009] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.522 [INFO][3009] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.531 [WARNING][3009] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" HandleID="k8s-pod-network.3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.532 [INFO][3009] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" HandleID="k8s-pod-network.3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.540 [INFO][3009] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:57:27.547830 env[1644]: 2024-02-12 21:57:27.544 [INFO][3003] k8s.go 591: Teardown processing complete. ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:27.550031 env[1644]: time="2024-02-12T21:57:27.548114197Z" level=info msg="TearDown network for sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\" successfully" Feb 12 21:57:27.550031 env[1644]: time="2024-02-12T21:57:27.548154677Z" level=info msg="StopPodSandbox for \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\" returns successfully" Feb 12 21:57:27.551081 systemd[1]: run-netns-cni\x2d8cb9c36f\x2d22fc\x2d702f\x2de6b9\x2d7674a3e0e493.mount: Deactivated successfully. Feb 12 21:57:27.554326 env[1644]: time="2024-02-12T21:57:27.554266066Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7pdj,Uid:7c92dae7-3f63-4e9c-99ad-89ea5c329db3,Namespace:calico-system,Attempt:1,}" Feb 12 21:57:27.754811 systemd-networkd[1456]: cali3fd17254e69: Link UP Feb 12 21:57:27.762324 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 21:57:27.762571 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3fd17254e69: link becomes ready Feb 12 21:57:27.761976 systemd-networkd[1456]: cali3fd17254e69: Gained carrier Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.637 [INFO][3015] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.16.216-k8s-csi--node--driver--m7pdj-eth0 csi-node-driver- calico-system 7c92dae7-3f63-4e9c-99ad-89ea5c329db3 895 0 2024-02-12 21:56:58 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.16.216 csi-node-driver-m7pdj eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali3fd17254e69 [] []}} ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Namespace="calico-system" Pod="csi-node-driver-m7pdj" WorkloadEndpoint="172.31.16.216-k8s-csi--node--driver--m7pdj-" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.638 [INFO][3015] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Namespace="calico-system" Pod="csi-node-driver-m7pdj" WorkloadEndpoint="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.674 [INFO][3027] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" HandleID="k8s-pod-network.495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.695 [INFO][3027] ipam_plugin.go 268: Auto assigning IP ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" HandleID="k8s-pod-network.495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d7b0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.16.216", "pod":"csi-node-driver-m7pdj", "timestamp":"2024-02-12 21:57:27.674738776 +0000 UTC"}, Hostname:"172.31.16.216", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.695 [INFO][3027] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.695 [INFO][3027] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.695 [INFO][3027] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.16.216' Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.701 [INFO][3027] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" host="172.31.16.216" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.709 [INFO][3027] ipam.go 372: Looking up existing affinities for host host="172.31.16.216" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.720 [INFO][3027] ipam.go 489: Trying affinity for 192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.725 [INFO][3027] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.729 [INFO][3027] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.729 [INFO][3027] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" host="172.31.16.216" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.731 [INFO][3027] ipam.go 1682: Creating new handle: k8s-pod-network.495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211 Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.737 [INFO][3027] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" host="172.31.16.216" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.743 [INFO][3027] ipam.go 1216: Successfully claimed IPs: [192.168.100.65/26] block=192.168.100.64/26 handle="k8s-pod-network.495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" host="172.31.16.216" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.743 [INFO][3027] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.65/26] handle="k8s-pod-network.495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" host="172.31.16.216" Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.744 [INFO][3027] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:57:27.791765 env[1644]: 2024-02-12 21:57:27.744 [INFO][3027] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.100.65/26] IPv6=[] ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" HandleID="k8s-pod-network.495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:27.806698 env[1644]: 2024-02-12 21:57:27.749 [INFO][3015] k8s.go 385: Populated endpoint ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Namespace="calico-system" Pod="csi-node-driver-m7pdj" WorkloadEndpoint="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-csi--node--driver--m7pdj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7c92dae7-3f63-4e9c-99ad-89ea5c329db3", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 56, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"", Pod:"csi-node-driver-m7pdj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali3fd17254e69", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:27.806698 env[1644]: 2024-02-12 21:57:27.749 [INFO][3015] k8s.go 386: Calico CNI using IPs: [192.168.100.65/32] ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Namespace="calico-system" Pod="csi-node-driver-m7pdj" WorkloadEndpoint="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:27.806698 env[1644]: 2024-02-12 21:57:27.749 [INFO][3015] dataplane_linux.go 68: Setting the host side veth name to cali3fd17254e69 ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Namespace="calico-system" Pod="csi-node-driver-m7pdj" WorkloadEndpoint="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:27.806698 env[1644]: 2024-02-12 21:57:27.763 [INFO][3015] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Namespace="calico-system" Pod="csi-node-driver-m7pdj" WorkloadEndpoint="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:27.806698 env[1644]: 2024-02-12 21:57:27.764 [INFO][3015] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Namespace="calico-system" Pod="csi-node-driver-m7pdj" WorkloadEndpoint="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-csi--node--driver--m7pdj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7c92dae7-3f63-4e9c-99ad-89ea5c329db3", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 56, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211", Pod:"csi-node-driver-m7pdj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali3fd17254e69", MAC:"0e:af:71:8a:47:b2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:27.806698 env[1644]: 2024-02-12 21:57:27.789 [INFO][3015] k8s.go 491: Wrote updated endpoint to datastore ContainerID="495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211" Namespace="calico-system" Pod="csi-node-driver-m7pdj" WorkloadEndpoint="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:27.838280 env[1644]: time="2024-02-12T21:57:27.838195164Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:57:27.838562 env[1644]: time="2024-02-12T21:57:27.838527009Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:57:27.838723 env[1644]: time="2024-02-12T21:57:27.838695829Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:57:27.839065 env[1644]: time="2024-02-12T21:57:27.839023030Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211 pid=3056 runtime=io.containerd.runc.v2 Feb 12 21:57:27.855000 audit[3066]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_chain pid=3066 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:57:27.855000 audit[3066]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff4ba41fe0 a2=0 a3=7fff4ba41fcc items=0 ppid=2815 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:27.855000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:57:27.880854 systemd[1]: Started cri-containerd-495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211.scope. Feb 12 21:57:27.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.901000 audit: BPF prog-id=94 op=LOAD Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3056 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:27.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439356438396365373736393561323435663766636132626236323765 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3056 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:27.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439356438396365373736393561323435663766636132626236323765 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit: BPF prog-id=95 op=LOAD Feb 12 21:57:27.902000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002d3ff0 items=0 ppid=3056 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:27.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439356438396365373736393561323435663766636132626236323765 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.902000 audit: BPF prog-id=96 op=LOAD Feb 12 21:57:27.902000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00033a038 items=0 ppid=3056 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:27.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439356438396365373736393561323435663766636132626236323765 Feb 12 21:57:27.902000 audit: BPF prog-id=96 op=UNLOAD Feb 12 21:57:27.902000 audit: BPF prog-id=95 op=UNLOAD Feb 12 21:57:27.903000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.903000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.903000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.903000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.903000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.903000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.903000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.903000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.903000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.903000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:27.903000 audit: BPF prog-id=97 op=LOAD Feb 12 21:57:27.903000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00033a448 items=0 ppid=3056 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:27.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439356438396365373736393561323435663766636132626236323765 Feb 12 21:57:27.923888 env[1644]: time="2024-02-12T21:57:27.923837480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7pdj,Uid:7c92dae7-3f63-4e9c-99ad-89ea5c329db3,Namespace:calico-system,Attempt:1,} returns sandbox id \"495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211\"" Feb 12 21:57:27.927983 env[1644]: time="2024-02-12T21:57:27.926598561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 21:57:28.178749 systemd-networkd[1456]: vxlan.calico: Gained IPv6LL Feb 12 21:57:28.179835 kubelet[2097]: E0212 21:57:28.179764 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:28.549647 systemd[1]: run-containerd-runc-k8s.io-495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211-runc.I6oTiu.mount: Deactivated successfully. Feb 12 21:57:29.157814 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount154830842.mount: Deactivated successfully. Feb 12 21:57:29.186433 kubelet[2097]: E0212 21:57:29.186372 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:29.265384 systemd-networkd[1456]: cali3fd17254e69: Gained IPv6LL Feb 12 21:57:29.701584 env[1644]: time="2024-02-12T21:57:29.701533281Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:29.704398 env[1644]: time="2024-02-12T21:57:29.704358331Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:29.706687 env[1644]: time="2024-02-12T21:57:29.706655677Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:29.708706 env[1644]: time="2024-02-12T21:57:29.708673289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:29.709326 env[1644]: time="2024-02-12T21:57:29.709290130Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 21:57:29.712434 env[1644]: time="2024-02-12T21:57:29.712393994Z" level=info msg="CreateContainer within sandbox \"495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 21:57:29.735824 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3009510240.mount: Deactivated successfully. Feb 12 21:57:29.744369 env[1644]: time="2024-02-12T21:57:29.744321925Z" level=info msg="CreateContainer within sandbox \"495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"25a8fafeb6baeb7e31a01da2a470e6e60b0cfceb4613127062205a3e7921b3dc\"" Feb 12 21:57:29.745087 env[1644]: time="2024-02-12T21:57:29.745054053Z" level=info msg="StartContainer for \"25a8fafeb6baeb7e31a01da2a470e6e60b0cfceb4613127062205a3e7921b3dc\"" Feb 12 21:57:29.781790 systemd[1]: run-containerd-runc-k8s.io-25a8fafeb6baeb7e31a01da2a470e6e60b0cfceb4613127062205a3e7921b3dc-runc.DbIl25.mount: Deactivated successfully. Feb 12 21:57:29.798751 systemd[1]: Started cri-containerd-25a8fafeb6baeb7e31a01da2a470e6e60b0cfceb4613127062205a3e7921b3dc.scope. Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit[3098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f033e1c0988 items=0 ppid=3056 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:29.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613866616665623662616562376533316130316461326134373065 Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.825000 audit: BPF prog-id=98 op=LOAD Feb 12 21:57:29.825000 audit[3098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00017a728 items=0 ppid=3056 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:29.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613866616665623662616562376533316130316461326134373065 Feb 12 21:57:29.826000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.826000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.826000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.826000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.826000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.826000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.826000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.826000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.826000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.826000 audit: BPF prog-id=99 op=LOAD Feb 12 21:57:29.826000 audit[3098]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00017a778 items=0 ppid=3056 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:29.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613866616665623662616562376533316130316461326134373065 Feb 12 21:57:29.827000 audit: BPF prog-id=99 op=UNLOAD Feb 12 21:57:29.827000 audit: BPF prog-id=98 op=UNLOAD Feb 12 21:57:29.827000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.827000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.827000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.827000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.827000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.827000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.827000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.827000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.827000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.827000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:29.827000 audit: BPF prog-id=100 op=LOAD Feb 12 21:57:29.827000 audit[3098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00017a808 items=0 ppid=3056 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:29.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613866616665623662616562376533316130316461326134373065 Feb 12 21:57:29.851927 env[1644]: time="2024-02-12T21:57:29.850481195Z" level=info msg="StartContainer for \"25a8fafeb6baeb7e31a01da2a470e6e60b0cfceb4613127062205a3e7921b3dc\" returns successfully" Feb 12 21:57:29.853229 env[1644]: time="2024-02-12T21:57:29.853196244Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 21:57:30.187282 kubelet[2097]: E0212 21:57:30.187114 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:31.187345 kubelet[2097]: E0212 21:57:31.187308 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:31.312190 env[1644]: time="2024-02-12T21:57:31.312141303Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:31.315532 env[1644]: time="2024-02-12T21:57:31.315493271Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:31.318180 env[1644]: time="2024-02-12T21:57:31.318126909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:31.324180 env[1644]: time="2024-02-12T21:57:31.324050715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:31.324609 env[1644]: time="2024-02-12T21:57:31.324580957Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 21:57:31.327400 env[1644]: time="2024-02-12T21:57:31.327359822Z" level=info msg="CreateContainer within sandbox \"495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 21:57:31.338886 env[1644]: time="2024-02-12T21:57:31.338787323Z" level=info msg="StopPodSandbox for \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\"" Feb 12 21:57:31.351529 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount717716988.mount: Deactivated successfully. Feb 12 21:57:31.362849 env[1644]: time="2024-02-12T21:57:31.362795999Z" level=info msg="CreateContainer within sandbox \"495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"af0f1088105c0060d9eaf914e6fc84d4f2c862c381da9fed4e7ceb498afc39fc\"" Feb 12 21:57:31.365665 env[1644]: time="2024-02-12T21:57:31.365621788Z" level=info msg="StartContainer for \"af0f1088105c0060d9eaf914e6fc84d4f2c862c381da9fed4e7ceb498afc39fc\"" Feb 12 21:57:31.426613 systemd[1]: run-containerd-runc-k8s.io-af0f1088105c0060d9eaf914e6fc84d4f2c862c381da9fed4e7ceb498afc39fc-runc.N1sPuY.mount: Deactivated successfully. Feb 12 21:57:31.434919 systemd[1]: Started cri-containerd-af0f1088105c0060d9eaf914e6fc84d4f2c862c381da9fed4e7ceb498afc39fc.scope. Feb 12 21:57:31.488761 kernel: kauditd_printk_skb: 176 callbacks suppressed Feb 12 21:57:31.488942 kernel: audit: type=1400 audit(1707775051.470:785): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.488989 kernel: audit: type=1300 audit(1707775051.470:785): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6683c12bd8 items=0 ppid=3056 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6683c12bd8 items=0 ppid=3056 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.502995 kernel: audit: type=1327 audit(1707775051.470:785): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166306631303838313035633030363064396561663931346536666338 Feb 12 21:57:31.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166306631303838313035633030363064396561663931346536666338 Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.517448 kernel: audit: type=1400 audit(1707775051.470:786): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.517556 kernel: audit: type=1400 audit(1707775051.470:786): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.529417 kernel: audit: type=1400 audit(1707775051.470:786): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.529837 kernel: audit: type=1400 audit(1707775051.470:786): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.535052 kernel: audit: type=1400 audit(1707775051.470:786): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.541037 kernel: audit: type=1400 audit(1707775051.470:786): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.546971 kernel: audit: type=1400 audit(1707775051.470:786): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.470000 audit: BPF prog-id=101 op=LOAD Feb 12 21:57:31.470000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a0818 items=0 ppid=3056 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166306631303838313035633030363064396561663931346536666338 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit: BPF prog-id=102 op=LOAD Feb 12 21:57:31.478000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a0868 items=0 ppid=3056 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166306631303838313035633030363064396561663931346536666338 Feb 12 21:57:31.478000 audit: BPF prog-id=102 op=UNLOAD Feb 12 21:57:31.478000 audit: BPF prog-id=101 op=UNLOAD Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.478000 audit: BPF prog-id=103 op=LOAD Feb 12 21:57:31.478000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a08f8 items=0 ppid=3056 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166306631303838313035633030363064396561663931346536666338 Feb 12 21:57:31.568350 env[1644]: time="2024-02-12T21:57:31.568220588Z" level=info msg="StartContainer for \"af0f1088105c0060d9eaf914e6fc84d4f2c862c381da9fed4e7ceb498afc39fc\" returns successfully" Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.450 [INFO][3147] k8s.go 578: Cleaning up netns ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.453 [INFO][3147] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" iface="eth0" netns="/var/run/netns/cni-7fee343c-79fe-b3df-15bd-e7d3d2e13afa" Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.453 [INFO][3147] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" iface="eth0" netns="/var/run/netns/cni-7fee343c-79fe-b3df-15bd-e7d3d2e13afa" Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.456 [INFO][3147] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" iface="eth0" netns="/var/run/netns/cni-7fee343c-79fe-b3df-15bd-e7d3d2e13afa" Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.456 [INFO][3147] k8s.go 585: Releasing IP address(es) ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.463 [INFO][3147] utils.go 188: Calico CNI releasing IP address ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.585 [INFO][3178] ipam_plugin.go 415: Releasing address using handleID ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" HandleID="k8s-pod-network.85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.585 [INFO][3178] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.585 [INFO][3178] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.594 [WARNING][3178] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" HandleID="k8s-pod-network.85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.594 [INFO][3178] ipam_plugin.go 443: Releasing address using workloadID ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" HandleID="k8s-pod-network.85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.596 [INFO][3178] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:57:31.598613 env[1644]: 2024-02-12 21:57:31.597 [INFO][3147] k8s.go 591: Teardown processing complete. ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:31.599253 env[1644]: time="2024-02-12T21:57:31.599153632Z" level=info msg="TearDown network for sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\" successfully" Feb 12 21:57:31.599253 env[1644]: time="2024-02-12T21:57:31.599193655Z" level=info msg="StopPodSandbox for \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\" returns successfully" Feb 12 21:57:31.600005 env[1644]: time="2024-02-12T21:57:31.599981741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-bn8gf,Uid:5b680462-5ee6-4663-8f1c-65742f5450cf,Namespace:default,Attempt:1,}" Feb 12 21:57:31.775852 systemd-networkd[1456]: cali67076b25e78: Link UP Feb 12 21:57:31.781079 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 21:57:31.781192 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali67076b25e78: link becomes ready Feb 12 21:57:31.780751 systemd-networkd[1456]: cali67076b25e78: Gained carrier Feb 12 21:57:31.780881 (udev-worker)[3219]: Network interface NamePolicy= disabled on kernel command line. Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.658 [INFO][3200] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0 nginx-deployment-845c78c8b9- default 5b680462-5ee6-4663-8f1c-65742f5450cf 915 0 2024-02-12 21:57:18 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.16.216 nginx-deployment-845c78c8b9-bn8gf eth0 default [] [] [kns.default ksa.default.default] cali67076b25e78 [] []}} ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Namespace="default" Pod="nginx-deployment-845c78c8b9-bn8gf" WorkloadEndpoint="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.658 [INFO][3200] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Namespace="default" Pod="nginx-deployment-845c78c8b9-bn8gf" WorkloadEndpoint="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.689 [INFO][3211] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" HandleID="k8s-pod-network.434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.703 [INFO][3211] ipam_plugin.go 268: Auto assigning IP ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" HandleID="k8s-pod-network.434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027dc30), Attrs:map[string]string{"namespace":"default", "node":"172.31.16.216", "pod":"nginx-deployment-845c78c8b9-bn8gf", "timestamp":"2024-02-12 21:57:31.689178835 +0000 UTC"}, Hostname:"172.31.16.216", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.703 [INFO][3211] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.704 [INFO][3211] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.704 [INFO][3211] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.16.216' Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.706 [INFO][3211] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" host="172.31.16.216" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.712 [INFO][3211] ipam.go 372: Looking up existing affinities for host host="172.31.16.216" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.720 [INFO][3211] ipam.go 489: Trying affinity for 192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.730 [INFO][3211] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.741 [INFO][3211] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.741 [INFO][3211] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" host="172.31.16.216" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.744 [INFO][3211] ipam.go 1682: Creating new handle: k8s-pod-network.434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.754 [INFO][3211] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" host="172.31.16.216" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.769 [INFO][3211] ipam.go 1216: Successfully claimed IPs: [192.168.100.66/26] block=192.168.100.64/26 handle="k8s-pod-network.434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" host="172.31.16.216" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.769 [INFO][3211] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.66/26] handle="k8s-pod-network.434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" host="172.31.16.216" Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.769 [INFO][3211] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:57:31.794707 env[1644]: 2024-02-12 21:57:31.769 [INFO][3211] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.100.66/26] IPv6=[] ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" HandleID="k8s-pod-network.434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:31.796793 env[1644]: 2024-02-12 21:57:31.770 [INFO][3200] k8s.go 385: Populated endpoint ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Namespace="default" Pod="nginx-deployment-845c78c8b9-bn8gf" WorkloadEndpoint="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"5b680462-5ee6-4663-8f1c-65742f5450cf", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 57, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-bn8gf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali67076b25e78", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:31.796793 env[1644]: 2024-02-12 21:57:31.770 [INFO][3200] k8s.go 386: Calico CNI using IPs: [192.168.100.66/32] ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Namespace="default" Pod="nginx-deployment-845c78c8b9-bn8gf" WorkloadEndpoint="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:31.796793 env[1644]: 2024-02-12 21:57:31.770 [INFO][3200] dataplane_linux.go 68: Setting the host side veth name to cali67076b25e78 ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Namespace="default" Pod="nginx-deployment-845c78c8b9-bn8gf" WorkloadEndpoint="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:31.796793 env[1644]: 2024-02-12 21:57:31.782 [INFO][3200] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Namespace="default" Pod="nginx-deployment-845c78c8b9-bn8gf" WorkloadEndpoint="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:31.796793 env[1644]: 2024-02-12 21:57:31.785 [INFO][3200] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Namespace="default" Pod="nginx-deployment-845c78c8b9-bn8gf" WorkloadEndpoint="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"5b680462-5ee6-4663-8f1c-65742f5450cf", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 57, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e", Pod:"nginx-deployment-845c78c8b9-bn8gf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali67076b25e78", MAC:"9a:b9:65:dc:c4:1f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:31.796793 env[1644]: 2024-02-12 21:57:31.793 [INFO][3200] k8s.go 491: Wrote updated endpoint to datastore ContainerID="434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e" Namespace="default" Pod="nginx-deployment-845c78c8b9-bn8gf" WorkloadEndpoint="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:31.822000 audit[3232]: NETFILTER_CFG table=filter:74 family=2 entries=40 op=nft_register_chain pid=3232 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:57:31.822000 audit[3232]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffd7b33ab20 a2=0 a3=7ffd7b33ab0c items=0 ppid=2815 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.822000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:57:31.830893 env[1644]: time="2024-02-12T21:57:31.830818871Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:57:31.831046 env[1644]: time="2024-02-12T21:57:31.830864677Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:57:31.831158 env[1644]: time="2024-02-12T21:57:31.830880227Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:57:31.831476 env[1644]: time="2024-02-12T21:57:31.831422643Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e pid=3243 runtime=io.containerd.runc.v2 Feb 12 21:57:31.848130 systemd[1]: Started cri-containerd-434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e.scope. Feb 12 21:57:31.863546 amazon-ssm-agent[1640]: 2024-02-12 21:57:31 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 12 21:57:31.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.868000 audit: BPF prog-id=104 op=LOAD Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3243 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346230376338363162333761613663313435353430326435646532 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3243 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346230376338363162333761613663313435353430326435646532 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit: BPF prog-id=105 op=LOAD Feb 12 21:57:31.869000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000394670 items=0 ppid=3243 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346230376338363162333761613663313435353430326435646532 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit: BPF prog-id=106 op=LOAD Feb 12 21:57:31.869000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003946b8 items=0 ppid=3243 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346230376338363162333761613663313435353430326435646532 Feb 12 21:57:31.869000 audit: BPF prog-id=106 op=UNLOAD Feb 12 21:57:31.869000 audit: BPF prog-id=105 op=UNLOAD Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:31.869000 audit: BPF prog-id=107 op=LOAD Feb 12 21:57:31.869000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000394ac8 items=0 ppid=3243 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:31.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346230376338363162333761613663313435353430326435646532 Feb 12 21:57:31.919491 env[1644]: time="2024-02-12T21:57:31.919446119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-bn8gf,Uid:5b680462-5ee6-4663-8f1c-65742f5450cf,Namespace:default,Attempt:1,} returns sandbox id \"434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e\"" Feb 12 21:57:31.921371 env[1644]: time="2024-02-12T21:57:31.921338604Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 21:57:32.187892 kubelet[2097]: E0212 21:57:32.187844 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:32.348078 systemd[1]: run-netns-cni\x2d7fee343c\x2d79fe\x2db3df\x2d15bd\x2de7d3d2e13afa.mount: Deactivated successfully. Feb 12 21:57:32.352765 kubelet[2097]: I0212 21:57:32.352724 2097 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 21:57:32.353693 kubelet[2097]: I0212 21:57:32.353674 2097 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 21:57:32.487211 kubelet[2097]: I0212 21:57:32.486983 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-m7pdj" podStartSLOduration=31.08732146 podCreationTimestamp="2024-02-12 21:56:58 +0000 UTC" firstStartedPulling="2024-02-12 21:57:27.925603645 +0000 UTC m=+31.150833787" lastFinishedPulling="2024-02-12 21:57:31.325230315 +0000 UTC m=+34.550460458" observedRunningTime="2024-02-12 21:57:32.48649073 +0000 UTC m=+35.711720878" watchObservedRunningTime="2024-02-12 21:57:32.486948131 +0000 UTC m=+35.712178280" Feb 12 21:57:32.850143 systemd-networkd[1456]: cali67076b25e78: Gained IPv6LL Feb 12 21:57:33.188879 kubelet[2097]: E0212 21:57:33.188099 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:34.189714 kubelet[2097]: E0212 21:57:34.189660 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:35.083013 update_engine[1628]: I0212 21:57:35.082968 1628 update_attempter.cc:509] Updating boot flags... Feb 12 21:57:35.189810 kubelet[2097]: E0212 21:57:35.189760 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:35.476151 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1480087536.mount: Deactivated successfully. Feb 12 21:57:36.190342 kubelet[2097]: E0212 21:57:36.190271 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:36.721696 env[1644]: time="2024-02-12T21:57:36.720421090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:36.726468 env[1644]: time="2024-02-12T21:57:36.726422144Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:36.729315 env[1644]: time="2024-02-12T21:57:36.729223748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:36.736101 env[1644]: time="2024-02-12T21:57:36.736059243Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:36.736934 env[1644]: time="2024-02-12T21:57:36.736879537Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 21:57:36.739461 env[1644]: time="2024-02-12T21:57:36.739429431Z" level=info msg="CreateContainer within sandbox \"434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 21:57:36.756389 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3974574393.mount: Deactivated successfully. Feb 12 21:57:36.766238 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2701540355.mount: Deactivated successfully. Feb 12 21:57:36.772733 env[1644]: time="2024-02-12T21:57:36.772688284Z" level=info msg="CreateContainer within sandbox \"434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"2754611a732fbfb14e96f10c36873611a22ada30ee8ce92bdb4af9ee1c14071a\"" Feb 12 21:57:36.773556 env[1644]: time="2024-02-12T21:57:36.773524261Z" level=info msg="StartContainer for \"2754611a732fbfb14e96f10c36873611a22ada30ee8ce92bdb4af9ee1c14071a\"" Feb 12 21:57:36.799764 systemd[1]: Started cri-containerd-2754611a732fbfb14e96f10c36873611a22ada30ee8ce92bdb4af9ee1c14071a.scope. Feb 12 21:57:36.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.821214 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 12 21:57:36.821273 kernel: audit: type=1400 audit(1707775056.818:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830930 kernel: audit: type=1400 audit(1707775056.818:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.841303 kernel: audit: type=1400 audit(1707775056.818:812): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.851185 kernel: audit: type=1400 audit(1707775056.818:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.851284 kernel: audit: type=1400 audit(1707775056.818:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.855997 kernel: audit: type=1400 audit(1707775056.818:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.856097 kernel: audit: type=1400 audit(1707775056.818:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.870174 kernel: audit: type=1400 audit(1707775056.818:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.870269 kernel: audit: type=1400 audit(1707775056.818:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.872109 env[1644]: time="2024-02-12T21:57:36.872070128Z" level=info msg="StartContainer for \"2754611a732fbfb14e96f10c36873611a22ada30ee8ce92bdb4af9ee1c14071a\" returns successfully" Feb 12 21:57:36.818000 audit: BPF prog-id=108 op=LOAD Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3243 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:36.876016 kernel: audit: type=1400 audit(1707775056.818:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237353436313161373332666266623134653936663130633336383733 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3243 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:36.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237353436313161373332666266623134653936663130633336383733 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.822000 audit: BPF prog-id=109 op=LOAD Feb 12 21:57:36.822000 audit[3391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00027bdc0 items=0 ppid=3243 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:36.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237353436313161373332666266623134653936663130633336383733 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit: BPF prog-id=110 op=LOAD Feb 12 21:57:36.830000 audit[3391]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00027be08 items=0 ppid=3243 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:36.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237353436313161373332666266623134653936663130633336383733 Feb 12 21:57:36.830000 audit: BPF prog-id=110 op=UNLOAD Feb 12 21:57:36.830000 audit: BPF prog-id=109 op=UNLOAD Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { perfmon } for pid=3391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit[3391]: AVC avc: denied { bpf } for pid=3391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:36.830000 audit: BPF prog-id=111 op=LOAD Feb 12 21:57:36.830000 audit[3391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003da218 items=0 ppid=3243 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:36.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237353436313161373332666266623134653936663130633336383733 Feb 12 21:57:37.149712 kubelet[2097]: E0212 21:57:37.149664 2097 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:37.191209 kubelet[2097]: E0212 21:57:37.191156 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:38.191852 kubelet[2097]: E0212 21:57:38.191801 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:39.192617 kubelet[2097]: E0212 21:57:39.192569 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:40.192893 kubelet[2097]: E0212 21:57:40.192844 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:41.193293 kubelet[2097]: E0212 21:57:41.193253 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:42.194069 kubelet[2097]: E0212 21:57:42.194010 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:43.194343 kubelet[2097]: E0212 21:57:43.194302 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:43.490000 audit[3442]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:43.496562 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 12 21:57:43.496676 kernel: audit: type=1325 audit(1707775063.490:828): table=filter:75 family=2 entries=20 op=nft_register_rule pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:43.490000 audit[3442]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffeffa3d430 a2=0 a3=7ffeffa3d41c items=0 ppid=2253 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:43.506706 kernel: audit: type=1300 audit(1707775063.490:828): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffeffa3d430 a2=0 a3=7ffeffa3d41c items=0 ppid=2253 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:43.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:43.510253 kernel: audit: type=1327 audit(1707775063.490:828): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:43.510349 kernel: audit: type=1325 audit(1707775063.506:829): table=nat:76 family=2 entries=20 op=nft_register_rule pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:43.506000 audit[3442]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=3442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:43.506000 audit[3442]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffeffa3d430 a2=0 a3=31030 items=0 ppid=2253 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:43.524659 kernel: audit: type=1300 audit(1707775063.506:829): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffeffa3d430 a2=0 a3=31030 items=0 ppid=2253 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:43.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:43.530942 kernel: audit: type=1327 audit(1707775063.506:829): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:43.533000 audit[3447]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=3447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:43.533000 audit[3447]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffffd8852e0 a2=0 a3=7ffffd8852cc items=0 ppid=2253 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:43.545305 kernel: audit: type=1325 audit(1707775063.533:830): table=filter:77 family=2 entries=32 op=nft_register_rule pid=3447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:43.545402 kernel: audit: type=1300 audit(1707775063.533:830): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffffd8852e0 a2=0 a3=7ffffd8852cc items=0 ppid=2253 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:43.545434 kernel: audit: type=1327 audit(1707775063.533:830): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:43.533000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:43.534000 audit[3447]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=3447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:43.534000 audit[3447]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffffd8852e0 a2=0 a3=31030 items=0 ppid=2253 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:43.534000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:43.552922 kernel: audit: type=1325 audit(1707775063.534:831): table=nat:78 family=2 entries=20 op=nft_register_rule pid=3447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:43.597705 kubelet[2097]: I0212 21:57:43.597662 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-bn8gf" podStartSLOduration=20.781010628 podCreationTimestamp="2024-02-12 21:57:18 +0000 UTC" firstStartedPulling="2024-02-12 21:57:31.920889957 +0000 UTC m=+35.146120083" lastFinishedPulling="2024-02-12 21:57:36.737495174 +0000 UTC m=+39.962725319" observedRunningTime="2024-02-12 21:57:37.529372522 +0000 UTC m=+40.754602671" watchObservedRunningTime="2024-02-12 21:57:43.597615864 +0000 UTC m=+46.822846013" Feb 12 21:57:43.598170 kubelet[2097]: I0212 21:57:43.598145 2097 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:57:43.606235 systemd[1]: Created slice kubepods-besteffort-podda317f3f_1e1c_40ab_97cf_e584155dacce.slice. Feb 12 21:57:43.646347 kubelet[2097]: I0212 21:57:43.646310 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/da317f3f-1e1c-40ab-97cf-e584155dacce-data\") pod \"nfs-server-provisioner-0\" (UID: \"da317f3f-1e1c-40ab-97cf-e584155dacce\") " pod="default/nfs-server-provisioner-0" Feb 12 21:57:43.646347 kubelet[2097]: I0212 21:57:43.646366 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sknv4\" (UniqueName: \"kubernetes.io/projected/da317f3f-1e1c-40ab-97cf-e584155dacce-kube-api-access-sknv4\") pod \"nfs-server-provisioner-0\" (UID: \"da317f3f-1e1c-40ab-97cf-e584155dacce\") " pod="default/nfs-server-provisioner-0" Feb 12 21:57:43.913119 env[1644]: time="2024-02-12T21:57:43.913070821Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:da317f3f-1e1c-40ab-97cf-e584155dacce,Namespace:default,Attempt:0,}" Feb 12 21:57:44.139416 (udev-worker)[3444]: Network interface NamePolicy= disabled on kernel command line. Feb 12 21:57:44.140164 systemd-networkd[1456]: cali60e51b789ff: Link UP Feb 12 21:57:44.144974 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 21:57:44.145253 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 21:57:44.145382 systemd-networkd[1456]: cali60e51b789ff: Gained carrier Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:43.983 [INFO][3449] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.16.216-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default da317f3f-1e1c-40ab-97cf-e584155dacce 973 0 2024-02-12 21:57:43 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.16.216 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.216-k8s-nfs--server--provisioner--0-" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:43.984 [INFO][3449] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.216-k8s-nfs--server--provisioner--0-eth0" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.044 [INFO][3460] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" HandleID="k8s-pod-network.613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Workload="172.31.16.216-k8s-nfs--server--provisioner--0-eth0" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.071 [INFO][3460] ipam_plugin.go 268: Auto assigning IP ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" HandleID="k8s-pod-network.613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Workload="172.31.16.216-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d9f0), Attrs:map[string]string{"namespace":"default", "node":"172.31.16.216", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 21:57:44.044317097 +0000 UTC"}, Hostname:"172.31.16.216", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.071 [INFO][3460] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.071 [INFO][3460] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.071 [INFO][3460] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.16.216' Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.074 [INFO][3460] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" host="172.31.16.216" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.087 [INFO][3460] ipam.go 372: Looking up existing affinities for host host="172.31.16.216" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.094 [INFO][3460] ipam.go 489: Trying affinity for 192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.097 [INFO][3460] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.102 [INFO][3460] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.102 [INFO][3460] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" host="172.31.16.216" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.108 [INFO][3460] ipam.go 1682: Creating new handle: k8s-pod-network.613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1 Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.116 [INFO][3460] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" host="172.31.16.216" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.134 [INFO][3460] ipam.go 1216: Successfully claimed IPs: [192.168.100.67/26] block=192.168.100.64/26 handle="k8s-pod-network.613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" host="172.31.16.216" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.134 [INFO][3460] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.67/26] handle="k8s-pod-network.613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" host="172.31.16.216" Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.134 [INFO][3460] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:57:44.173426 env[1644]: 2024-02-12 21:57:44.134 [INFO][3460] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.100.67/26] IPv6=[] ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" HandleID="k8s-pod-network.613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Workload="172.31.16.216-k8s-nfs--server--provisioner--0-eth0" Feb 12 21:57:44.175101 env[1644]: 2024-02-12 21:57:44.136 [INFO][3449] k8s.go 385: Populated endpoint ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.216-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"da317f3f-1e1c-40ab-97cf-e584155dacce", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 57, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.100.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:44.175101 env[1644]: 2024-02-12 21:57:44.136 [INFO][3449] k8s.go 386: Calico CNI using IPs: [192.168.100.67/32] ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.216-k8s-nfs--server--provisioner--0-eth0" Feb 12 21:57:44.175101 env[1644]: 2024-02-12 21:57:44.136 [INFO][3449] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.216-k8s-nfs--server--provisioner--0-eth0" Feb 12 21:57:44.175101 env[1644]: 2024-02-12 21:57:44.146 [INFO][3449] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.216-k8s-nfs--server--provisioner--0-eth0" Feb 12 21:57:44.175369 env[1644]: 2024-02-12 21:57:44.146 [INFO][3449] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.216-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"da317f3f-1e1c-40ab-97cf-e584155dacce", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 57, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.100.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"a2:04:5f:48:89:67", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:44.175369 env[1644]: 2024-02-12 21:57:44.165 [INFO][3449] k8s.go 491: Wrote updated endpoint to datastore ContainerID="613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.216-k8s-nfs--server--provisioner--0-eth0" Feb 12 21:57:44.195429 kubelet[2097]: E0212 21:57:44.195337 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:44.199163 env[1644]: time="2024-02-12T21:57:44.196966301Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:57:44.199411 env[1644]: time="2024-02-12T21:57:44.199148902Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:57:44.199539 env[1644]: time="2024-02-12T21:57:44.199400984Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:57:44.200983 env[1644]: time="2024-02-12T21:57:44.199760366Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1 pid=3488 runtime=io.containerd.runc.v2 Feb 12 21:57:44.225000 audit[3499]: NETFILTER_CFG table=filter:79 family=2 entries=44 op=nft_register_chain pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:57:44.225000 audit[3499]: SYSCALL arch=c000003e syscall=46 success=yes exit=22352 a0=3 a1=7ffd445659b0 a2=0 a3=7ffd4456599c items=0 ppid=2815 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:44.225000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:57:44.246961 systemd[1]: Started cri-containerd-613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1.scope. Feb 12 21:57:44.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.264000 audit: BPF prog-id=112 op=LOAD Feb 12 21:57:44.266000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.266000 audit[3498]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3488 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:44.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631336431333665333232633162333632323534623935356235303562 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3488 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:44.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631336431333665333232633162333632323534623935356235303562 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit: BPF prog-id=113 op=LOAD Feb 12 21:57:44.267000 audit[3498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002150e0 items=0 ppid=3488 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:44.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631336431333665333232633162333632323534623935356235303562 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit: BPF prog-id=114 op=LOAD Feb 12 21:57:44.267000 audit[3498]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000215128 items=0 ppid=3488 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:44.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631336431333665333232633162333632323534623935356235303562 Feb 12 21:57:44.267000 audit: BPF prog-id=114 op=UNLOAD Feb 12 21:57:44.267000 audit: BPF prog-id=113 op=UNLOAD Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:44.267000 audit: BPF prog-id=115 op=LOAD Feb 12 21:57:44.267000 audit[3498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000215538 items=0 ppid=3488 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:44.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631336431333665333232633162333632323534623935356235303562 Feb 12 21:57:44.306340 env[1644]: time="2024-02-12T21:57:44.306294704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:da317f3f-1e1c-40ab-97cf-e584155dacce,Namespace:default,Attempt:0,} returns sandbox id \"613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1\"" Feb 12 21:57:44.310813 env[1644]: time="2024-02-12T21:57:44.310748966Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 21:57:45.196187 kubelet[2097]: E0212 21:57:45.196112 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:45.969090 systemd-networkd[1456]: cali60e51b789ff: Gained IPv6LL Feb 12 21:57:46.196403 kubelet[2097]: E0212 21:57:46.196330 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:47.196717 kubelet[2097]: E0212 21:57:47.196622 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:47.784070 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2542938519.mount: Deactivated successfully. Feb 12 21:57:48.197117 kubelet[2097]: E0212 21:57:48.197036 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:48.673544 systemd[1]: run-containerd-runc-k8s.io-dd7c90475d86d91a140d3b4c9e7e803ec496dd5cab5496a4478a5714c2e063af-runc.vij2dU.mount: Deactivated successfully. Feb 12 21:57:49.197759 kubelet[2097]: E0212 21:57:49.197681 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:50.198401 kubelet[2097]: E0212 21:57:50.198360 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:50.633338 env[1644]: time="2024-02-12T21:57:50.633241651Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:50.636804 env[1644]: time="2024-02-12T21:57:50.636761406Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:50.639391 env[1644]: time="2024-02-12T21:57:50.639351921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:50.641994 env[1644]: time="2024-02-12T21:57:50.641849773Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:50.643005 env[1644]: time="2024-02-12T21:57:50.642969322Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 12 21:57:50.646616 env[1644]: time="2024-02-12T21:57:50.646580760Z" level=info msg="CreateContainer within sandbox \"613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 21:57:50.669841 env[1644]: time="2024-02-12T21:57:50.669565458Z" level=info msg="CreateContainer within sandbox \"613d136e322c1b362254b955b505bb74e5ed1632ba801870ce7c2a42fe8b4fc1\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"7cda4f992a658f3e52a44253156a195ea20d818277256f3263ea5d4983e92eec\"" Feb 12 21:57:50.671388 env[1644]: time="2024-02-12T21:57:50.671309487Z" level=info msg="StartContainer for \"7cda4f992a658f3e52a44253156a195ea20d818277256f3263ea5d4983e92eec\"" Feb 12 21:57:50.711247 systemd[1]: run-containerd-runc-k8s.io-7cda4f992a658f3e52a44253156a195ea20d818277256f3263ea5d4983e92eec-runc.sw7xeo.mount: Deactivated successfully. Feb 12 21:57:50.716544 systemd[1]: Started cri-containerd-7cda4f992a658f3e52a44253156a195ea20d818277256f3263ea5d4983e92eec.scope. Feb 12 21:57:50.736050 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 21:57:50.736233 kernel: audit: type=1400 audit(1707775070.729:851): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.736316 kernel: audit: type=1400 audit(1707775070.729:852): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745440 kernel: audit: type=1400 audit(1707775070.729:853): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.750491 kernel: audit: type=1400 audit(1707775070.729:854): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.755213 kernel: audit: type=1400 audit(1707775070.729:855): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.759698 kernel: audit: type=1400 audit(1707775070.729:856): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764491 kernel: audit: type=1400 audit(1707775070.729:857): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.769448 kernel: audit: type=1400 audit(1707775070.729:858): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.774086 kernel: audit: type=1400 audit(1707775070.729:859): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.778809 kernel: audit: type=1400 audit(1707775070.740:860): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.740000 audit: BPF prog-id=116 op=LOAD Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3488 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:50.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763646134663939326136353866336535326134343235333135366131 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3488 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:50.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763646134663939326136353866336535326134343235333135366131 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.745000 audit: BPF prog-id=117 op=LOAD Feb 12 21:57:50.745000 audit[3560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003ce010 items=0 ppid=3488 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:50.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763646134663939326136353866336535326134343235333135366131 Feb 12 21:57:50.754000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.754000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.754000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.754000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.754000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.754000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.754000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.754000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.754000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.754000 audit: BPF prog-id=118 op=LOAD Feb 12 21:57:50.754000 audit[3560]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003ce058 items=0 ppid=3488 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:50.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763646134663939326136353866336535326134343235333135366131 Feb 12 21:57:50.764000 audit: BPF prog-id=118 op=UNLOAD Feb 12 21:57:50.764000 audit: BPF prog-id=117 op=UNLOAD Feb 12 21:57:50.764000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:50.764000 audit: BPF prog-id=119 op=LOAD Feb 12 21:57:50.764000 audit[3560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003ce468 items=0 ppid=3488 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:50.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763646134663939326136353866336535326134343235333135366131 Feb 12 21:57:50.796025 env[1644]: time="2024-02-12T21:57:50.795959954Z" level=info msg="StartContainer for \"7cda4f992a658f3e52a44253156a195ea20d818277256f3263ea5d4983e92eec\" returns successfully" Feb 12 21:57:50.851000 audit[3587]: AVC avc: denied { search } for pid=3587 comm="rpcbind" name="crypto" dev="proc" ino=23435 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c778 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 21:57:50.851000 audit[3587]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7faf270a30c0 a2=0 a3=0 items=0 ppid=3571 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c778 key=(null) Feb 12 21:57:50.851000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 21:57:50.897000 audit[3592]: AVC avc: denied { search } for pid=3592 comm="dbus-daemon" name="crypto" dev="proc" ino=23435 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c778 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 21:57:50.897000 audit[3592]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f17d03950c0 a2=0 a3=0 items=0 ppid=3571 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c778 key=(null) Feb 12 21:57:50.897000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 21:57:50.902000 audit[3593]: AVC avc: denied { watch } for pid=3593 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c778 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c218,c778 tclass=dir permissive=0 Feb 12 21:57:50.902000 audit[3593]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56283bb177e0 a2=2c8 a3=7fff6d5a415c items=0 ppid=3571 pid=3593 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c778 key=(null) Feb 12 21:57:50.902000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 21:57:50.908000 audit[3594]: AVC avc: denied { read } for pid=3594 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23707 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c778 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 21:57:50.908000 audit[3594]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f3f8c8bb320 a1=80000 a2=d a3=7fffc15e28e0 items=0 ppid=3571 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c778 key=(null) Feb 12 21:57:50.908000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 21:57:50.909000 audit[3594]: AVC avc: denied { search } for pid=3594 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23435 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c778 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 21:57:50.909000 audit[3594]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f3f8be0f0c0 a2=0 a3=0 items=0 ppid=3571 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c778 key=(null) Feb 12 21:57:50.909000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 21:57:51.199612 kubelet[2097]: E0212 21:57:51.199395 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:51.314000 audit[3599]: NETFILTER_CFG table=filter:80 family=2 entries=33 op=nft_register_rule pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:51.314000 audit[3599]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffed517edb0 a2=0 a3=7ffed517ed9c items=0 ppid=2253 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:51.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:51.315000 audit[3599]: NETFILTER_CFG table=nat:81 family=2 entries=20 op=nft_register_rule pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:51.315000 audit[3599]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffed517edb0 a2=0 a3=31030 items=0 ppid=2253 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:51.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:51.383000 audit[3601]: NETFILTER_CFG table=filter:82 family=2 entries=34 op=nft_register_rule pid=3601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:51.383000 audit[3601]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffe002df290 a2=0 a3=7ffe002df27c items=0 ppid=2253 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:51.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:51.384000 audit[3601]: NETFILTER_CFG table=nat:83 family=2 entries=20 op=nft_register_rule pid=3601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:51.384000 audit[3601]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe002df290 a2=0 a3=31030 items=0 ppid=2253 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:51.384000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:51.452995 kubelet[2097]: I0212 21:57:51.452805 2097 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:57:51.459671 systemd[1]: Created slice kubepods-besteffort-pod65f8efdf_0fda_44f3_b259_34dc2cae54c2.slice. Feb 12 21:57:51.627329 kubelet[2097]: I0212 21:57:51.627288 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ktv6x\" (UniqueName: \"kubernetes.io/projected/65f8efdf-0fda-44f3-b259-34dc2cae54c2-kube-api-access-ktv6x\") pod \"calico-apiserver-78648f7bbb-smkwn\" (UID: \"65f8efdf-0fda-44f3-b259-34dc2cae54c2\") " pod="calico-apiserver/calico-apiserver-78648f7bbb-smkwn" Feb 12 21:57:51.627870 kubelet[2097]: I0212 21:57:51.627848 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/65f8efdf-0fda-44f3-b259-34dc2cae54c2-calico-apiserver-certs\") pod \"calico-apiserver-78648f7bbb-smkwn\" (UID: \"65f8efdf-0fda-44f3-b259-34dc2cae54c2\") " pod="calico-apiserver/calico-apiserver-78648f7bbb-smkwn" Feb 12 21:57:51.730278 kubelet[2097]: E0212 21:57:51.730160 2097 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 21:57:51.730278 kubelet[2097]: E0212 21:57:51.730267 2097 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/65f8efdf-0fda-44f3-b259-34dc2cae54c2-calico-apiserver-certs podName:65f8efdf-0fda-44f3-b259-34dc2cae54c2 nodeName:}" failed. No retries permitted until 2024-02-12 21:57:52.230231025 +0000 UTC m=+55.455461167 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/65f8efdf-0fda-44f3-b259-34dc2cae54c2-calico-apiserver-certs") pod "calico-apiserver-78648f7bbb-smkwn" (UID: "65f8efdf-0fda-44f3-b259-34dc2cae54c2") : secret "calico-apiserver-certs" not found Feb 12 21:57:52.200611 kubelet[2097]: E0212 21:57:52.200565 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:52.364875 env[1644]: time="2024-02-12T21:57:52.364819900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78648f7bbb-smkwn,Uid:65f8efdf-0fda-44f3-b259-34dc2cae54c2,Namespace:calico-apiserver,Attempt:0,}" Feb 12 21:57:52.411000 audit[3607]: NETFILTER_CFG table=filter:84 family=2 entries=22 op=nft_register_rule pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:52.411000 audit[3607]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd3a318140 a2=0 a3=7ffd3a31812c items=0 ppid=2253 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:52.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:52.417000 audit[3607]: NETFILTER_CFG table=nat:85 family=2 entries=104 op=nft_register_chain pid=3607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:52.417000 audit[3607]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffd3a318140 a2=0 a3=7ffd3a31812c items=0 ppid=2253 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:52.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:52.573122 systemd-networkd[1456]: caliceb7f000e25: Link UP Feb 12 21:57:52.577595 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 21:57:52.577716 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliceb7f000e25: link becomes ready Feb 12 21:57:52.581020 systemd-networkd[1456]: caliceb7f000e25: Gained carrier Feb 12 21:57:52.581201 (udev-worker)[3625]: Network interface NamePolicy= disabled on kernel command line. Feb 12 21:57:52.592444 kubelet[2097]: I0212 21:57:52.592079 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=3.25868119 podCreationTimestamp="2024-02-12 21:57:43 +0000 UTC" firstStartedPulling="2024-02-12 21:57:44.310171358 +0000 UTC m=+47.535401489" lastFinishedPulling="2024-02-12 21:57:50.643514208 +0000 UTC m=+53.868744350" observedRunningTime="2024-02-12 21:57:51.606046434 +0000 UTC m=+54.831276583" watchObservedRunningTime="2024-02-12 21:57:52.592024051 +0000 UTC m=+55.817254201" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.454 [INFO][3605] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0 calico-apiserver-78648f7bbb- calico-apiserver 65f8efdf-0fda-44f3-b259-34dc2cae54c2 1047 0 2024-02-12 21:57:51 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:78648f7bbb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.16.216 calico-apiserver-78648f7bbb-smkwn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliceb7f000e25 [] []}} ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Namespace="calico-apiserver" Pod="calico-apiserver-78648f7bbb-smkwn" WorkloadEndpoint="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.454 [INFO][3605] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Namespace="calico-apiserver" Pod="calico-apiserver-78648f7bbb-smkwn" WorkloadEndpoint="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.487 [INFO][3619] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" HandleID="k8s-pod-network.b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Workload="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.508 [INFO][3619] ipam_plugin.go 268: Auto assigning IP ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" HandleID="k8s-pod-network.b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Workload="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b8db0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.16.216", "pod":"calico-apiserver-78648f7bbb-smkwn", "timestamp":"2024-02-12 21:57:52.487972554 +0000 UTC"}, Hostname:"172.31.16.216", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.508 [INFO][3619] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.508 [INFO][3619] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.508 [INFO][3619] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.16.216' Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.512 [INFO][3619] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" host="172.31.16.216" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.531 [INFO][3619] ipam.go 372: Looking up existing affinities for host host="172.31.16.216" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.548 [INFO][3619] ipam.go 489: Trying affinity for 192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.550 [INFO][3619] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.553 [INFO][3619] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="172.31.16.216" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.553 [INFO][3619] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" host="172.31.16.216" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.556 [INFO][3619] ipam.go 1682: Creating new handle: k8s-pod-network.b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.559 [INFO][3619] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" host="172.31.16.216" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.566 [INFO][3619] ipam.go 1216: Successfully claimed IPs: [192.168.100.68/26] block=192.168.100.64/26 handle="k8s-pod-network.b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" host="172.31.16.216" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.566 [INFO][3619] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.68/26] handle="k8s-pod-network.b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" host="172.31.16.216" Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.566 [INFO][3619] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:57:52.605368 env[1644]: 2024-02-12 21:57:52.566 [INFO][3619] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.100.68/26] IPv6=[] ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" HandleID="k8s-pod-network.b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Workload="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0" Feb 12 21:57:52.606848 env[1644]: 2024-02-12 21:57:52.568 [INFO][3605] k8s.go 385: Populated endpoint ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Namespace="calico-apiserver" Pod="calico-apiserver-78648f7bbb-smkwn" WorkloadEndpoint="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0", GenerateName:"calico-apiserver-78648f7bbb-", Namespace:"calico-apiserver", SelfLink:"", UID:"65f8efdf-0fda-44f3-b259-34dc2cae54c2", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 57, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78648f7bbb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"", Pod:"calico-apiserver-78648f7bbb-smkwn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.100.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliceb7f000e25", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:52.606848 env[1644]: 2024-02-12 21:57:52.568 [INFO][3605] k8s.go 386: Calico CNI using IPs: [192.168.100.68/32] ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Namespace="calico-apiserver" Pod="calico-apiserver-78648f7bbb-smkwn" WorkloadEndpoint="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0" Feb 12 21:57:52.606848 env[1644]: 2024-02-12 21:57:52.568 [INFO][3605] dataplane_linux.go 68: Setting the host side veth name to caliceb7f000e25 ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Namespace="calico-apiserver" Pod="calico-apiserver-78648f7bbb-smkwn" WorkloadEndpoint="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0" Feb 12 21:57:52.606848 env[1644]: 2024-02-12 21:57:52.582 [INFO][3605] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Namespace="calico-apiserver" Pod="calico-apiserver-78648f7bbb-smkwn" WorkloadEndpoint="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0" Feb 12 21:57:52.606848 env[1644]: 2024-02-12 21:57:52.582 [INFO][3605] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Namespace="calico-apiserver" Pod="calico-apiserver-78648f7bbb-smkwn" WorkloadEndpoint="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0", GenerateName:"calico-apiserver-78648f7bbb-", Namespace:"calico-apiserver", SelfLink:"", UID:"65f8efdf-0fda-44f3-b259-34dc2cae54c2", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 57, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78648f7bbb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e", Pod:"calico-apiserver-78648f7bbb-smkwn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.100.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliceb7f000e25", MAC:"3e:bc:e0:26:fd:83", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:52.606848 env[1644]: 2024-02-12 21:57:52.597 [INFO][3605] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e" Namespace="calico-apiserver" Pod="calico-apiserver-78648f7bbb-smkwn" WorkloadEndpoint="172.31.16.216-k8s-calico--apiserver--78648f7bbb--smkwn-eth0" Feb 12 21:57:52.647364 env[1644]: time="2024-02-12T21:57:52.647122317Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:57:52.647364 env[1644]: time="2024-02-12T21:57:52.647180868Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:57:52.647364 env[1644]: time="2024-02-12T21:57:52.647197813Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:57:52.647717 env[1644]: time="2024-02-12T21:57:52.647655569Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e pid=3652 runtime=io.containerd.runc.v2 Feb 12 21:57:52.669000 audit[3664]: NETFILTER_CFG table=filter:86 family=2 entries=51 op=nft_register_chain pid=3664 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:57:52.669000 audit[3664]: SYSCALL arch=c000003e syscall=46 success=yes exit=26900 a0=3 a1=7ffda3416410 a2=0 a3=7ffda34163fc items=0 ppid=2815 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:52.669000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:57:52.687164 systemd[1]: Started cri-containerd-b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e.scope. Feb 12 21:57:52.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.704000 audit: BPF prog-id=120 op=LOAD Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3652 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:52.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232316137303864316338656563346362333731376639323734343036 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3652 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:52.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232316137303864316338656563346362333731376639323734343036 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.706000 audit: BPF prog-id=121 op=LOAD Feb 12 21:57:52.706000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000215a40 items=0 ppid=3652 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:52.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232316137303864316338656563346362333731376639323734343036 Feb 12 21:57:52.707000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.707000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.707000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.707000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.707000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.707000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.707000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.707000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.707000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.707000 audit: BPF prog-id=122 op=LOAD Feb 12 21:57:52.707000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000215a88 items=0 ppid=3652 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:52.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232316137303864316338656563346362333731376639323734343036 Feb 12 21:57:52.707000 audit: BPF prog-id=122 op=UNLOAD Feb 12 21:57:52.708000 audit: BPF prog-id=121 op=UNLOAD Feb 12 21:57:52.708000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.708000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.708000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.708000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.708000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.708000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.708000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.708000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.708000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.708000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:52.708000 audit: BPF prog-id=123 op=LOAD Feb 12 21:57:52.708000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000215e98 items=0 ppid=3652 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:52.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232316137303864316338656563346362333731376639323734343036 Feb 12 21:57:52.748915 env[1644]: time="2024-02-12T21:57:52.747545552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78648f7bbb-smkwn,Uid:65f8efdf-0fda-44f3-b259-34dc2cae54c2,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e\"" Feb 12 21:57:52.749725 env[1644]: time="2024-02-12T21:57:52.749672716Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 21:57:53.201565 kubelet[2097]: E0212 21:57:53.201521 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:53.649737 systemd-networkd[1456]: caliceb7f000e25: Gained IPv6LL Feb 12 21:57:54.008707 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount678768736.mount: Deactivated successfully. Feb 12 21:57:54.202128 kubelet[2097]: E0212 21:57:54.202070 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:55.203017 kubelet[2097]: E0212 21:57:55.202976 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:56.203781 kubelet[2097]: E0212 21:57:56.203708 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:56.247224 env[1644]: time="2024-02-12T21:57:56.247175010Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:56.249961 env[1644]: time="2024-02-12T21:57:56.249921989Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:56.252819 env[1644]: time="2024-02-12T21:57:56.252779096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:56.255522 env[1644]: time="2024-02-12T21:57:56.255486558Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:57:56.256207 env[1644]: time="2024-02-12T21:57:56.256170960Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 21:57:56.258552 env[1644]: time="2024-02-12T21:57:56.258518953Z" level=info msg="CreateContainer within sandbox \"b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 21:57:56.272533 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3942879973.mount: Deactivated successfully. Feb 12 21:57:56.279655 env[1644]: time="2024-02-12T21:57:56.279606525Z" level=info msg="CreateContainer within sandbox \"b21a708d1c8eec4cb3717f92744066490a5a31d06d009be0e76ecb1d0522cb1e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5d1dfbbb9c24745e4c7137d0524d7cf067a3493b031bd215b193da3d926052d0\"" Feb 12 21:57:56.280310 env[1644]: time="2024-02-12T21:57:56.280212019Z" level=info msg="StartContainer for \"5d1dfbbb9c24745e4c7137d0524d7cf067a3493b031bd215b193da3d926052d0\"" Feb 12 21:57:56.319025 systemd[1]: Started cri-containerd-5d1dfbbb9c24745e4c7137d0524d7cf067a3493b031bd215b193da3d926052d0.scope. Feb 12 21:57:56.356946 kernel: kauditd_printk_skb: 140 callbacks suppressed Feb 12 21:57:56.357169 kernel: audit: type=1400 audit(1707775076.343:899): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.357212 kernel: audit: type=1400 audit(1707775076.343:900): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.357255 kernel: audit: type=1400 audit(1707775076.343:901): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.368202 kernel: audit: type=1400 audit(1707775076.343:902): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.368330 kernel: audit: type=1400 audit(1707775076.343:903): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.383094 kernel: audit: type=1400 audit(1707775076.343:904): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.383222 kernel: audit: type=1400 audit(1707775076.343:905): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.393616 kernel: audit: type=1400 audit(1707775076.343:906): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.393760 kernel: audit: type=1400 audit(1707775076.343:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit: BPF prog-id=124 op=LOAD Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3652 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:56.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564316466626262396332343734356534633731333764303532346437 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3652 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:56.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564316466626262396332343734356534633731333764303532346437 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.404923 kernel: audit: type=1400 audit(1707775076.344:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.344000 audit: BPF prog-id=125 op=LOAD Feb 12 21:57:56.344000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ce0d0 items=0 ppid=3652 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:56.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564316466626262396332343734356534633731333764303532346437 Feb 12 21:57:56.345000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.345000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.345000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.345000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.345000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.345000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.345000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.345000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.345000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.345000 audit: BPF prog-id=126 op=LOAD Feb 12 21:57:56.345000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ce118 items=0 ppid=3652 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:56.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564316466626262396332343734356534633731333764303532346437 Feb 12 21:57:56.350000 audit: BPF prog-id=126 op=UNLOAD Feb 12 21:57:56.350000 audit: BPF prog-id=125 op=UNLOAD Feb 12 21:57:56.350000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.350000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.350000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.350000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.350000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.350000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.350000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.350000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.350000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.350000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:57:56.350000 audit: BPF prog-id=127 op=LOAD Feb 12 21:57:56.350000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ce528 items=0 ppid=3652 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:56.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564316466626262396332343734356534633731333764303532346437 Feb 12 21:57:56.433868 env[1644]: time="2024-02-12T21:57:56.433554387Z" level=info msg="StartContainer for \"5d1dfbbb9c24745e4c7137d0524d7cf067a3493b031bd215b193da3d926052d0\" returns successfully" Feb 12 21:57:56.662000 audit[3728]: NETFILTER_CFG table=filter:87 family=2 entries=10 op=nft_register_rule pid=3728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:56.662000 audit[3728]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc09954ee0 a2=0 a3=7ffc09954ecc items=0 ppid=2253 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:56.662000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:56.664000 audit[3728]: NETFILTER_CFG table=nat:88 family=2 entries=44 op=nft_register_rule pid=3728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:56.664000 audit[3728]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc09954ee0 a2=0 a3=7ffc09954ecc items=0 ppid=2253 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:56.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:57.149279 kubelet[2097]: E0212 21:57:57.149220 2097 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:57.204059 kubelet[2097]: E0212 21:57:57.204016 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:57.218212 env[1644]: time="2024-02-12T21:57:57.218084694Z" level=info msg="StopPodSandbox for \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\"" Feb 12 21:57:57.275874 systemd[1]: run-containerd-runc-k8s.io-5d1dfbbb9c24745e4c7137d0524d7cf067a3493b031bd215b193da3d926052d0-runc.9imcP7.mount: Deactivated successfully. Feb 12 21:57:57.289000 audit[3709]: AVC avc: denied { watch } for pid=3709 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_21_57_52.4049062277/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c552 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c165,c552 tclass=file permissive=0 Feb 12 21:57:57.289000 audit[3709]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005f2c80 a2=fc6 a3=0 items=0 ppid=3652 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c552 key=(null) Feb 12 21:57:57.289000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.324 [WARNING][3742] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-csi--node--driver--m7pdj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7c92dae7-3f63-4e9c-99ad-89ea5c329db3", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 56, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211", Pod:"csi-node-driver-m7pdj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali3fd17254e69", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.325 [INFO][3742] k8s.go 578: Cleaning up netns ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.325 [INFO][3742] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" iface="eth0" netns="" Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.326 [INFO][3742] k8s.go 585: Releasing IP address(es) ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.326 [INFO][3742] utils.go 188: Calico CNI releasing IP address ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.358 [INFO][3748] ipam_plugin.go 415: Releasing address using handleID ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" HandleID="k8s-pod-network.3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.359 [INFO][3748] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.359 [INFO][3748] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.372 [WARNING][3748] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" HandleID="k8s-pod-network.3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.372 [INFO][3748] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" HandleID="k8s-pod-network.3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.375 [INFO][3748] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:57:57.378093 env[1644]: 2024-02-12 21:57:57.376 [INFO][3742] k8s.go 591: Teardown processing complete. ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:57.379197 env[1644]: time="2024-02-12T21:57:57.378124950Z" level=info msg="TearDown network for sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\" successfully" Feb 12 21:57:57.379197 env[1644]: time="2024-02-12T21:57:57.378163626Z" level=info msg="StopPodSandbox for \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\" returns successfully" Feb 12 21:57:57.379197 env[1644]: time="2024-02-12T21:57:57.378926822Z" level=info msg="RemovePodSandbox for \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\"" Feb 12 21:57:57.379197 env[1644]: time="2024-02-12T21:57:57.378962377Z" level=info msg="Forcibly stopping sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\"" Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.466 [WARNING][3770] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-csi--node--driver--m7pdj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7c92dae7-3f63-4e9c-99ad-89ea5c329db3", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 56, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"495d89ce77695a245f7fca2bb627ec50a9022ca506eb56c1414677d2c5582211", Pod:"csi-node-driver-m7pdj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali3fd17254e69", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.467 [INFO][3770] k8s.go 578: Cleaning up netns ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.467 [INFO][3770] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" iface="eth0" netns="" Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.467 [INFO][3770] k8s.go 585: Releasing IP address(es) ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.467 [INFO][3770] utils.go 188: Calico CNI releasing IP address ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.494 [INFO][3777] ipam_plugin.go 415: Releasing address using handleID ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" HandleID="k8s-pod-network.3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.494 [INFO][3777] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.494 [INFO][3777] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.506 [WARNING][3777] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" HandleID="k8s-pod-network.3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.506 [INFO][3777] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" HandleID="k8s-pod-network.3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Workload="172.31.16.216-k8s-csi--node--driver--m7pdj-eth0" Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.508 [INFO][3777] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:57:57.511091 env[1644]: 2024-02-12 21:57:57.509 [INFO][3770] k8s.go 591: Teardown processing complete. ContainerID="3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f" Feb 12 21:57:57.513795 env[1644]: time="2024-02-12T21:57:57.511043859Z" level=info msg="TearDown network for sandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\" successfully" Feb 12 21:57:57.521530 env[1644]: time="2024-02-12T21:57:57.521481069Z" level=info msg="RemovePodSandbox \"3c8d2da4575361eafac080ea9e29ce08a76f367b12aa26888fee5ee783a23e7f\" returns successfully" Feb 12 21:57:57.523822 env[1644]: time="2024-02-12T21:57:57.523137197Z" level=info msg="StopPodSandbox for \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\"" Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.594 [WARNING][3796] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"5b680462-5ee6-4663-8f1c-65742f5450cf", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 57, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e", Pod:"nginx-deployment-845c78c8b9-bn8gf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali67076b25e78", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.594 [INFO][3796] k8s.go 578: Cleaning up netns ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.594 [INFO][3796] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" iface="eth0" netns="" Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.594 [INFO][3796] k8s.go 585: Releasing IP address(es) ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.594 [INFO][3796] utils.go 188: Calico CNI releasing IP address ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.624 [INFO][3802] ipam_plugin.go 415: Releasing address using handleID ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" HandleID="k8s-pod-network.85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.624 [INFO][3802] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.624 [INFO][3802] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.650 [WARNING][3802] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" HandleID="k8s-pod-network.85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.651 [INFO][3802] ipam_plugin.go 443: Releasing address using workloadID ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" HandleID="k8s-pod-network.85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.658 [INFO][3802] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:57:57.661448 env[1644]: 2024-02-12 21:57:57.659 [INFO][3796] k8s.go 591: Teardown processing complete. ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:57.662075 env[1644]: time="2024-02-12T21:57:57.661487192Z" level=info msg="TearDown network for sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\" successfully" Feb 12 21:57:57.662075 env[1644]: time="2024-02-12T21:57:57.661523432Z" level=info msg="StopPodSandbox for \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\" returns successfully" Feb 12 21:57:57.662798 env[1644]: time="2024-02-12T21:57:57.662739709Z" level=info msg="RemovePodSandbox for \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\"" Feb 12 21:57:57.663159 env[1644]: time="2024-02-12T21:57:57.663073494Z" level=info msg="Forcibly stopping sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\"" Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.731 [WARNING][3823] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"5b680462-5ee6-4663-8f1c-65742f5450cf", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 57, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"434b07c861b37aa6c1455402d5de2d764fb7d24f19804ef09213572e3fe8189e", Pod:"nginx-deployment-845c78c8b9-bn8gf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali67076b25e78", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.732 [INFO][3823] k8s.go 578: Cleaning up netns ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.732 [INFO][3823] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" iface="eth0" netns="" Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.732 [INFO][3823] k8s.go 585: Releasing IP address(es) ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.732 [INFO][3823] utils.go 188: Calico CNI releasing IP address ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.762 [INFO][3829] ipam_plugin.go 415: Releasing address using handleID ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" HandleID="k8s-pod-network.85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.762 [INFO][3829] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.762 [INFO][3829] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.776 [WARNING][3829] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" HandleID="k8s-pod-network.85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.776 [INFO][3829] ipam_plugin.go 443: Releasing address using workloadID ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" HandleID="k8s-pod-network.85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Workload="172.31.16.216-k8s-nginx--deployment--845c78c8b9--bn8gf-eth0" Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.778 [INFO][3829] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:57:57.782328 env[1644]: 2024-02-12 21:57:57.780 [INFO][3823] k8s.go 591: Teardown processing complete. ContainerID="85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79" Feb 12 21:57:57.782328 env[1644]: time="2024-02-12T21:57:57.781156087Z" level=info msg="TearDown network for sandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\" successfully" Feb 12 21:57:57.786030 env[1644]: time="2024-02-12T21:57:57.785982909Z" level=info msg="RemovePodSandbox \"85cc5cf814cda5450fa2027951d94c4f3767e95f14b4c60890aea29ac8bceb79\" returns successfully" Feb 12 21:57:58.204742 kubelet[2097]: E0212 21:57:58.204696 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:57:58.529000 audit[3836]: NETFILTER_CFG table=filter:89 family=2 entries=10 op=nft_register_rule pid=3836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:58.529000 audit[3836]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff7dc0fd40 a2=0 a3=7fff7dc0fd2c items=0 ppid=2253 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:58.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:58.531000 audit[3836]: NETFILTER_CFG table=nat:90 family=2 entries=44 op=nft_register_rule pid=3836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 21:57:58.531000 audit[3836]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fff7dc0fd40 a2=0 a3=7fff7dc0fd2c items=0 ppid=2253 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:57:58.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 21:57:59.205463 kubelet[2097]: E0212 21:57:59.205411 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:00.205616 kubelet[2097]: E0212 21:58:00.205572 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:01.206313 kubelet[2097]: E0212 21:58:01.206266 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:02.207273 kubelet[2097]: E0212 21:58:02.207221 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:03.207878 kubelet[2097]: E0212 21:58:03.207834 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:04.208290 kubelet[2097]: E0212 21:58:04.208237 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:05.208755 kubelet[2097]: E0212 21:58:05.208682 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:06.209776 kubelet[2097]: E0212 21:58:06.209727 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:07.210110 kubelet[2097]: E0212 21:58:07.210068 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:08.210993 kubelet[2097]: E0212 21:58:08.210942 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:09.212331 kubelet[2097]: E0212 21:58:09.212285 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:10.212678 kubelet[2097]: E0212 21:58:10.212639 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:11.213698 kubelet[2097]: E0212 21:58:11.213648 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:12.214712 kubelet[2097]: E0212 21:58:12.214673 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:13.215436 kubelet[2097]: E0212 21:58:13.215384 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:14.216552 kubelet[2097]: E0212 21:58:14.216405 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:15.216864 kubelet[2097]: E0212 21:58:15.216811 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:15.806049 kubelet[2097]: I0212 21:58:15.805895 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-78648f7bbb-smkwn" podStartSLOduration=21.298687708 podCreationTimestamp="2024-02-12 21:57:51 +0000 UTC" firstStartedPulling="2024-02-12 21:57:52.749324843 +0000 UTC m=+55.974554972" lastFinishedPulling="2024-02-12 21:57:56.256484599 +0000 UTC m=+59.481714743" observedRunningTime="2024-02-12 21:57:56.635125212 +0000 UTC m=+59.860355433" watchObservedRunningTime="2024-02-12 21:58:15.805847479 +0000 UTC m=+79.031077628" Feb 12 21:58:15.806299 kubelet[2097]: I0212 21:58:15.806161 2097 topology_manager.go:212] "Topology Admit Handler" Feb 12 21:58:15.813103 systemd[1]: Created slice kubepods-besteffort-pod5ffa921c_e808_4afb_807f_19f15babd392.slice. Feb 12 21:58:15.961596 kubelet[2097]: I0212 21:58:15.961558 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8jnrh\" (UniqueName: \"kubernetes.io/projected/5ffa921c-e808-4afb-807f-19f15babd392-kube-api-access-8jnrh\") pod \"test-pod-1\" (UID: \"5ffa921c-e808-4afb-807f-19f15babd392\") " pod="default/test-pod-1" Feb 12 21:58:15.961789 kubelet[2097]: I0212 21:58:15.961688 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-bc85b057-9916-48bc-854d-a245f347182a\" (UniqueName: \"kubernetes.io/nfs/5ffa921c-e808-4afb-807f-19f15babd392-pvc-bc85b057-9916-48bc-854d-a245f347182a\") pod \"test-pod-1\" (UID: \"5ffa921c-e808-4afb-807f-19f15babd392\") " pod="default/test-pod-1" Feb 12 21:58:16.115437 kernel: Failed to create system directory netfs Feb 12 21:58:16.115716 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 21:58:16.116014 kernel: audit: type=1400 audit(1707775096.102:922): avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.116135 kernel: Failed to create system directory netfs Feb 12 21:58:16.116173 kernel: audit: type=1400 audit(1707775096.102:922): avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.116238 kernel: Failed to create system directory netfs Feb 12 21:58:16.102000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.102000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.122093 kernel: audit: type=1400 audit(1707775096.102:922): avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.122215 kernel: Failed to create system directory netfs Feb 12 21:58:16.102000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.136025 kernel: audit: type=1400 audit(1707775096.102:922): avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.102000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.102000 audit[3869]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563aea0c95e0 a1=153bc a2=563ae927a2b0 a3=5 items=0 ppid=59 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:16.153403 kernel: audit: type=1300 audit(1707775096.102:922): arch=c000003e syscall=175 success=yes exit=0 a0=563aea0c95e0 a1=153bc a2=563ae927a2b0 a3=5 items=0 ppid=59 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:16.153531 kernel: audit: type=1327 audit(1707775096.102:922): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 21:58:16.102000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 21:58:16.167521 kernel: Failed to create system directory fscache Feb 12 21:58:16.167656 kernel: audit: type=1400 audit(1707775096.156:923): avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.167694 kernel: Failed to create system directory fscache Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.176525 kernel: audit: type=1400 audit(1707775096.156:923): avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.176672 kernel: Failed to create system directory fscache Feb 12 21:58:16.176703 kernel: audit: type=1400 audit(1707775096.156:923): avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.182985 kernel: Failed to create system directory fscache Feb 12 21:58:16.183101 kernel: audit: type=1400 audit(1707775096.156:923): avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.188423 kernel: Failed to create system directory fscache Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.191484 kernel: Failed to create system directory fscache Feb 12 21:58:16.191593 kernel: Failed to create system directory fscache Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.196535 kernel: Failed to create system directory fscache Feb 12 21:58:16.196631 kernel: Failed to create system directory fscache Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.199365 kernel: Failed to create system directory fscache Feb 12 21:58:16.199478 kernel: Failed to create system directory fscache Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.201966 kernel: Failed to create system directory fscache Feb 12 21:58:16.202054 kernel: Failed to create system directory fscache Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.156000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.204607 kernel: Failed to create system directory fscache Feb 12 21:58:16.207928 kernel: FS-Cache: Loaded Feb 12 21:58:16.156000 audit[3869]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563aea2de9c0 a1=4c0fc a2=563ae927a2b0 a3=5 items=0 ppid=59 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:16.156000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 21:58:16.217434 kubelet[2097]: E0212 21:58:16.217348 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.261824 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.261954 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.261983 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.264399 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.264482 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.266708 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.267123 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.269571 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.269699 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.271880 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.271948 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.275315 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.275383 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.278701 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.278782 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.280790 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.281018 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.283064 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.283130 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.285344 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.285447 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.287570 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.288171 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.290956 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.291172 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.293356 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.293413 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.295572 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.295624 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.298404 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.298469 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.300797 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.300949 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.303729 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.303792 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.306217 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.306288 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.310127 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.310201 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.312260 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.312366 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.314451 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.314507 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.317134 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.317206 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.319333 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.319384 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.321629 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.321682 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.323883 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.323954 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.326408 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.326456 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.328626 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.328664 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.330878 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.331063 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.333092 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.333143 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.335254 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.335300 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.336319 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.337532 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.339657 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.339707 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.341080 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.343122 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.343155 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.345374 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.345420 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.347413 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.347437 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.349506 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.349545 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.351511 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.351556 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.353824 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.353965 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.357936 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.358026 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.360539 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.360619 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.361603 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.364279 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.364364 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.372364 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.372477 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.372508 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.372536 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.372562 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.372586 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.373015 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.374418 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.377775 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.377862 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.380073 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.380205 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.382532 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.382606 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.385275 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.385431 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.387822 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.387877 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.390814 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.390907 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.391959 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.394484 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.394529 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.397086 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.397134 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.400258 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.400306 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.402361 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.402401 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.404520 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.404559 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.407398 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.407467 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.409858 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.409991 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.412296 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.412376 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.413337 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.415391 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.415439 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.232000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.417966 kernel: Failed to create system directory sunrpc Feb 12 21:58:16.429235 kernel: RPC: Registered named UNIX socket transport module. Feb 12 21:58:16.429427 kernel: RPC: Registered udp transport module. Feb 12 21:58:16.429464 kernel: RPC: Registered tcp transport module. Feb 12 21:58:16.431791 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 21:58:16.232000 audit[3869]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563aea32aad0 a1=1588c4 a2=563ae927a2b0 a3=5 items=6 ppid=59 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:16.232000 audit: CWD cwd="/" Feb 12 21:58:16.232000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:58:16.232000 audit: PATH item=1 name=(null) inode=24401 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:58:16.232000 audit: PATH item=2 name=(null) inode=24401 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:58:16.232000 audit: PATH item=3 name=(null) inode=24402 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:58:16.232000 audit: PATH item=4 name=(null) inode=24401 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:58:16.232000 audit: PATH item=5 name=(null) inode=24403 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:58:16.232000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.472928 kernel: Failed to create system directory nfs Feb 12 21:58:16.473010 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.475438 kernel: Failed to create system directory nfs Feb 12 21:58:16.475512 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.478081 kernel: Failed to create system directory nfs Feb 12 21:58:16.478135 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.481413 kernel: Failed to create system directory nfs Feb 12 21:58:16.481467 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.483919 kernel: Failed to create system directory nfs Feb 12 21:58:16.484005 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.486166 kernel: Failed to create system directory nfs Feb 12 21:58:16.486215 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.488427 kernel: Failed to create system directory nfs Feb 12 21:58:16.488483 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.490747 kernel: Failed to create system directory nfs Feb 12 21:58:16.490802 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.493284 kernel: Failed to create system directory nfs Feb 12 21:58:16.493366 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.495294 kernel: Failed to create system directory nfs Feb 12 21:58:16.495361 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.497542 kernel: Failed to create system directory nfs Feb 12 21:58:16.497650 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.500798 kernel: Failed to create system directory nfs Feb 12 21:58:16.500861 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.503231 kernel: Failed to create system directory nfs Feb 12 21:58:16.503312 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.505171 kernel: Failed to create system directory nfs Feb 12 21:58:16.505213 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.507283 kernel: Failed to create system directory nfs Feb 12 21:58:16.507337 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.511038 kernel: Failed to create system directory nfs Feb 12 21:58:16.511100 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.513001 kernel: Failed to create system directory nfs Feb 12 21:58:16.513043 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.515491 kernel: Failed to create system directory nfs Feb 12 21:58:16.515545 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.517813 kernel: Failed to create system directory nfs Feb 12 21:58:16.517881 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.520348 kernel: Failed to create system directory nfs Feb 12 21:58:16.520419 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.522666 kernel: Failed to create system directory nfs Feb 12 21:58:16.522740 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.525310 kernel: Failed to create system directory nfs Feb 12 21:58:16.525378 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.527437 kernel: Failed to create system directory nfs Feb 12 21:58:16.527542 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.529525 kernel: Failed to create system directory nfs Feb 12 21:58:16.529696 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.531942 kernel: Failed to create system directory nfs Feb 12 21:58:16.532002 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.532934 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.534777 kernel: Failed to create system directory nfs Feb 12 21:58:16.534829 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.537367 kernel: Failed to create system directory nfs Feb 12 21:58:16.537428 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.540061 kernel: Failed to create system directory nfs Feb 12 21:58:16.540121 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.541128 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.461000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.543560 kernel: Failed to create system directory nfs Feb 12 21:58:16.461000 audit[3869]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563aea4cd680 a1=e29dc a2=563ae927a2b0 a3=5 items=0 ppid=59 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:16.461000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 21:58:16.561233 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.617927 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.618016 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.621670 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.621740 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.627155 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.627250 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.627278 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.628381 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.634336 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.634482 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.639294 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.644180 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.644254 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.647405 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.649861 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.653888 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.653965 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.654929 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.656096 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.658736 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.658795 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.661246 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.661302 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.663843 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.663926 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.666210 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.666262 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.668529 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.668576 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.669693 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.671092 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.673165 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.673416 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.674880 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.682808 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.690802 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.690973 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.692083 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.694388 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.694487 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.696860 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.696946 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.699305 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.699356 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.701510 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.701586 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.704008 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.704147 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.705399 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.706244 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.707688 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.709920 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.710034 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.711911 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.711950 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.714354 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.714404 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.715368 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.716320 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.717409 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.720714 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.720798 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.721871 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.722928 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.724169 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.726479 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.726527 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.728764 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.728810 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.729665 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.730696 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.732944 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.732990 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.735216 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.735255 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.736136 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.737173 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.739217 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.739256 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.741596 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.741631 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.744713 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.744815 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.747101 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.747167 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.749484 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.749577 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.751701 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.751750 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.753982 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.754045 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.756035 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.756121 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.595000 audit[3874]: AVC avc: denied { confidentiality } for pid=3874 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.759223 kernel: Failed to create system directory nfs4 Feb 12 21:58:16.957576 kernel: NFS: Registering the id_resolver key type Feb 12 21:58:16.957694 kernel: Key type id_resolver registered Feb 12 21:58:16.957739 kernel: Key type id_legacy registered Feb 12 21:58:16.595000 audit[3874]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f9a06be1010 a1=1d3cc4 a2=5624ed0772b0 a3=5 items=0 ppid=59 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:16.595000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.981095 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.981193 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.981387 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.982961 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.985390 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.985457 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.987618 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.987728 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.990364 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.990426 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.993842 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.993969 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.996361 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.996441 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.999048 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.999099 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:17.001490 kernel: Failed to create system directory rpcgss Feb 12 21:58:17.001631 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:17.003921 kernel: Failed to create system directory rpcgss Feb 12 21:58:17.003985 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:17.006352 kernel: Failed to create system directory rpcgss Feb 12 21:58:17.006417 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:17.009090 kernel: Failed to create system directory rpcgss Feb 12 21:58:17.009282 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:17.011602 kernel: Failed to create system directory rpcgss Feb 12 21:58:17.011674 kernel: Failed to create system directory rpcgss Feb 12 21:58:16.972000 audit[3877]: AVC avc: denied { confidentiality } for pid=3877 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 21:58:16.972000 audit[3877]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f3c858c9010 a1=4f524 a2=561f3c94b2b0 a3=5 items=0 ppid=59 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:16.972000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 21:58:17.050445 nfsidmap[3882]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Feb 12 21:58:17.058598 nfsidmap[3883]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Feb 12 21:58:17.075000 audit[1833]: AVC avc: denied { watch_reads } for pid=1833 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2805 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 21:58:17.075000 audit[1833]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56310bbd1f20 a2=10 a3=22e91f626c8aa09f items=0 ppid=1 pid=1833 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:17.075000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 21:58:17.075000 audit[1833]: AVC avc: denied { watch_reads } for pid=1833 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2805 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 21:58:17.075000 audit[1833]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56310bbd1f20 a2=10 a3=22e91f626c8aa09f items=0 ppid=1 pid=1833 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:17.075000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 21:58:17.075000 audit[1833]: AVC avc: denied { watch_reads } for pid=1833 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2805 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 21:58:17.075000 audit[1833]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56310bbd1f20 a2=10 a3=22e91f626c8aa09f items=0 ppid=1 pid=1833 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:17.075000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 21:58:17.077000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2805 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 21:58:17.077000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2805 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 21:58:17.077000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2805 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 21:58:17.149513 kubelet[2097]: E0212 21:58:17.149469 2097 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:17.217823 kubelet[2097]: E0212 21:58:17.217704 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:17.320266 env[1644]: time="2024-02-12T21:58:17.320217300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5ffa921c-e808-4afb-807f-19f15babd392,Namespace:default,Attempt:0,}" Feb 12 21:58:17.566405 (udev-worker)[3870]: Network interface NamePolicy= disabled on kernel command line. Feb 12 21:58:17.569343 systemd-networkd[1456]: cali5ec59c6bf6e: Link UP Feb 12 21:58:17.573999 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 21:58:17.574277 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 21:58:17.574420 systemd-networkd[1456]: cali5ec59c6bf6e: Gained carrier Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.394 [INFO][3884] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.16.216-k8s-test--pod--1-eth0 default 5ffa921c-e808-4afb-807f-19f15babd392 1144 0 2024-02-12 21:57:44 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.16.216 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.216-k8s-test--pod--1-" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.394 [INFO][3884] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.216-k8s-test--pod--1-eth0" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.434 [INFO][3896] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" HandleID="k8s-pod-network.55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Workload="172.31.16.216-k8s-test--pod--1-eth0" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.489 [INFO][3896] ipam_plugin.go 268: Auto assigning IP ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" HandleID="k8s-pod-network.55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Workload="172.31.16.216-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027da10), Attrs:map[string]string{"namespace":"default", "node":"172.31.16.216", "pod":"test-pod-1", "timestamp":"2024-02-12 21:58:17.434923867 +0000 UTC"}, Hostname:"172.31.16.216", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.489 [INFO][3896] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.489 [INFO][3896] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.489 [INFO][3896] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.16.216' Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.504 [INFO][3896] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" host="172.31.16.216" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.525 [INFO][3896] ipam.go 372: Looking up existing affinities for host host="172.31.16.216" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.538 [INFO][3896] ipam.go 489: Trying affinity for 192.168.100.64/26 host="172.31.16.216" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.541 [INFO][3896] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="172.31.16.216" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.544 [INFO][3896] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="172.31.16.216" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.544 [INFO][3896] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" host="172.31.16.216" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.546 [INFO][3896] ipam.go 1682: Creating new handle: k8s-pod-network.55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9 Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.553 [INFO][3896] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" host="172.31.16.216" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.559 [INFO][3896] ipam.go 1216: Successfully claimed IPs: [192.168.100.69/26] block=192.168.100.64/26 handle="k8s-pod-network.55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" host="172.31.16.216" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.559 [INFO][3896] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.69/26] handle="k8s-pod-network.55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" host="172.31.16.216" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.559 [INFO][3896] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.559 [INFO][3896] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.100.69/26] IPv6=[] ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" HandleID="k8s-pod-network.55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Workload="172.31.16.216-k8s-test--pod--1-eth0" Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.561 [INFO][3884] k8s.go 385: Populated endpoint ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.216-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5ffa921c-e808-4afb-807f-19f15babd392", ResourceVersion:"1144", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 57, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:58:17.595787 env[1644]: 2024-02-12 21:58:17.561 [INFO][3884] k8s.go 386: Calico CNI using IPs: [192.168.100.69/32] ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.216-k8s-test--pod--1-eth0" Feb 12 21:58:17.597228 env[1644]: 2024-02-12 21:58:17.561 [INFO][3884] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.216-k8s-test--pod--1-eth0" Feb 12 21:58:17.597228 env[1644]: 2024-02-12 21:58:17.576 [INFO][3884] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.216-k8s-test--pod--1-eth0" Feb 12 21:58:17.597228 env[1644]: 2024-02-12 21:58:17.582 [INFO][3884] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.216-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.216-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5ffa921c-e808-4afb-807f-19f15babd392", ResourceVersion:"1144", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 21, 57, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.216", ContainerID:"55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"8a:f6:5e:76:27:b0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 21:58:17.597228 env[1644]: 2024-02-12 21:58:17.591 [INFO][3884] k8s.go 491: Wrote updated endpoint to datastore ContainerID="55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.216-k8s-test--pod--1-eth0" Feb 12 21:58:17.615637 env[1644]: time="2024-02-12T21:58:17.615552309Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 21:58:17.615928 env[1644]: time="2024-02-12T21:58:17.615873192Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 21:58:17.616107 env[1644]: time="2024-02-12T21:58:17.616067429Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 21:58:17.616646 env[1644]: time="2024-02-12T21:58:17.616590938Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9 pid=3928 runtime=io.containerd.runc.v2 Feb 12 21:58:17.615000 audit[3929]: NETFILTER_CFG table=filter:91 family=2 entries=38 op=nft_register_chain pid=3929 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 21:58:17.615000 audit[3929]: SYSCALL arch=c000003e syscall=46 success=yes exit=19064 a0=3 a1=7ffe0681be60 a2=0 a3=7ffe0681be4c items=0 ppid=2815 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:17.615000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 21:58:17.637441 systemd[1]: Started cri-containerd-55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9.scope. Feb 12 21:58:17.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.662000 audit: BPF prog-id=128 op=LOAD Feb 12 21:58:17.664000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.664000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3928 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:17.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646535353730626239653562663763643231633836623037393064 Feb 12 21:58:17.664000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.664000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3928 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:17.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646535353730626239653562663763643231633836623037393064 Feb 12 21:58:17.665000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.665000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.665000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.665000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.665000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.665000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.665000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.665000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.665000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.665000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.665000 audit: BPF prog-id=129 op=LOAD Feb 12 21:58:17.665000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003fa0b0 items=0 ppid=3928 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:17.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646535353730626239653562663763643231633836623037393064 Feb 12 21:58:17.666000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.666000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.666000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.666000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.666000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.666000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.666000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.666000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.666000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.666000 audit: BPF prog-id=130 op=LOAD Feb 12 21:58:17.666000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003fa0f8 items=0 ppid=3928 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:17.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646535353730626239653562663763643231633836623037393064 Feb 12 21:58:17.670000 audit: BPF prog-id=130 op=UNLOAD Feb 12 21:58:17.670000 audit: BPF prog-id=129 op=UNLOAD Feb 12 21:58:17.670000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.670000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.670000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.670000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.670000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.670000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.670000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.670000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.670000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.670000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:17.670000 audit: BPF prog-id=131 op=LOAD Feb 12 21:58:17.670000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003fa508 items=0 ppid=3928 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:17.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646535353730626239653562663763643231633836623037393064 Feb 12 21:58:17.712658 env[1644]: time="2024-02-12T21:58:17.711976396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5ffa921c-e808-4afb-807f-19f15babd392,Namespace:default,Attempt:0,} returns sandbox id \"55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9\"" Feb 12 21:58:17.714315 env[1644]: time="2024-02-12T21:58:17.714278614Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 21:58:18.128421 env[1644]: time="2024-02-12T21:58:18.128372826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:58:18.131513 env[1644]: time="2024-02-12T21:58:18.131467827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:58:18.134201 env[1644]: time="2024-02-12T21:58:18.134167185Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:58:18.136527 env[1644]: time="2024-02-12T21:58:18.136490607Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 21:58:18.137267 env[1644]: time="2024-02-12T21:58:18.137230935Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 21:58:18.141004 env[1644]: time="2024-02-12T21:58:18.140942270Z" level=info msg="CreateContainer within sandbox \"55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 21:58:18.165314 env[1644]: time="2024-02-12T21:58:18.165268597Z" level=info msg="CreateContainer within sandbox \"55de5570bb9e5bf7cd21c86b0790d0bd2ea1d5c6ae0169f32a6e22ea4a9f3db9\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"495301d49db2c5d029b5f9b2c420d1c2fa4821b3d3b83b2a8a04f398f6b146f9\"" Feb 12 21:58:18.165934 env[1644]: time="2024-02-12T21:58:18.165876276Z" level=info msg="StartContainer for \"495301d49db2c5d029b5f9b2c420d1c2fa4821b3d3b83b2a8a04f398f6b146f9\"" Feb 12 21:58:18.196112 systemd[1]: Started cri-containerd-495301d49db2c5d029b5f9b2c420d1c2fa4821b3d3b83b2a8a04f398f6b146f9.scope. Feb 12 21:58:18.218643 kubelet[2097]: E0212 21:58:18.218597 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:18.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.222000 audit: BPF prog-id=132 op=LOAD Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3928 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:18.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439353330316434396462326335643032396235663962326334323064 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3928 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:18.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439353330316434396462326335643032396235663962326334323064 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit: BPF prog-id=133 op=LOAD Feb 12 21:58:18.223000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000025a60 items=0 ppid=3928 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:18.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439353330316434396462326335643032396235663962326334323064 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.223000 audit: BPF prog-id=134 op=LOAD Feb 12 21:58:18.223000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000025aa8 items=0 ppid=3928 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:18.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439353330316434396462326335643032396235663962326334323064 Feb 12 21:58:18.224000 audit: BPF prog-id=134 op=UNLOAD Feb 12 21:58:18.224000 audit: BPF prog-id=133 op=UNLOAD Feb 12 21:58:18.224000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.224000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.224000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.224000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.224000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.224000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.224000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.224000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.224000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.224000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:58:18.224000 audit: BPF prog-id=135 op=LOAD Feb 12 21:58:18.224000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025eb8 items=0 ppid=3928 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:58:18.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439353330316434396462326335643032396235663962326334323064 Feb 12 21:58:18.281001 env[1644]: time="2024-02-12T21:58:18.280943630Z" level=info msg="StartContainer for \"495301d49db2c5d029b5f9b2c420d1c2fa4821b3d3b83b2a8a04f398f6b146f9\" returns successfully" Feb 12 21:58:18.338118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2889076535.mount: Deactivated successfully. Feb 12 21:58:18.662837 systemd[1]: run-containerd-runc-k8s.io-dd7c90475d86d91a140d3b4c9e7e803ec496dd5cab5496a4478a5714c2e063af-runc.JAvcAi.mount: Deactivated successfully. Feb 12 21:58:18.993167 systemd-networkd[1456]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 21:58:19.219275 kubelet[2097]: E0212 21:58:19.219225 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:20.219957 kubelet[2097]: E0212 21:58:20.219848 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 21:58:21.220506 kubelet[2097]: E0212 21:58:21.220449 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"