Feb 12 22:02:39.210213 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 22:02:39.210246 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:02:39.210262 kernel: BIOS-provided physical RAM map: Feb 12 22:02:39.210273 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 22:02:39.210284 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 22:02:39.210295 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 22:02:39.210310 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Feb 12 22:02:39.210320 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Feb 12 22:02:39.210331 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Feb 12 22:02:39.210341 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 22:02:39.210353 kernel: NX (Execute Disable) protection: active Feb 12 22:02:39.210366 kernel: SMBIOS 2.7 present. Feb 12 22:02:39.210380 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Feb 12 22:02:39.210393 kernel: Hypervisor detected: KVM Feb 12 22:02:39.210412 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 22:02:39.210425 kernel: kvm-clock: cpu 0, msr 74faa001, primary cpu clock Feb 12 22:02:39.210439 kernel: kvm-clock: using sched offset of 6857428698 cycles Feb 12 22:02:39.210454 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 22:02:39.210469 kernel: tsc: Detected 2499.998 MHz processor Feb 12 22:02:39.210483 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 22:02:39.210500 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 22:02:39.210514 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Feb 12 22:02:39.210528 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 22:02:39.210542 kernel: Using GB pages for direct mapping Feb 12 22:02:39.210555 kernel: ACPI: Early table checksum verification disabled Feb 12 22:02:39.210569 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Feb 12 22:02:39.210583 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Feb 12 22:02:39.210598 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 12 22:02:39.210611 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Feb 12 22:02:39.210742 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Feb 12 22:02:39.210757 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 22:02:39.210770 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 12 22:02:39.210785 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Feb 12 22:02:39.210798 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 12 22:02:39.210812 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Feb 12 22:02:39.210827 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Feb 12 22:02:39.210842 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 22:02:39.210860 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Feb 12 22:02:39.210873 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Feb 12 22:02:39.210899 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Feb 12 22:02:39.210919 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Feb 12 22:02:39.210934 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Feb 12 22:02:39.210949 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Feb 12 22:02:39.210964 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Feb 12 22:02:39.210981 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Feb 12 22:02:39.210996 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Feb 12 22:02:39.211112 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Feb 12 22:02:39.211128 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 22:02:39.211143 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 22:02:39.211159 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Feb 12 22:02:39.211174 kernel: NUMA: Initialized distance table, cnt=1 Feb 12 22:02:39.211189 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Feb 12 22:02:39.211208 kernel: Zone ranges: Feb 12 22:02:39.211222 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 22:02:39.211237 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Feb 12 22:02:39.211252 kernel: Normal empty Feb 12 22:02:39.211267 kernel: Movable zone start for each node Feb 12 22:02:39.211282 kernel: Early memory node ranges Feb 12 22:02:39.211425 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 22:02:39.211441 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Feb 12 22:02:39.211494 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Feb 12 22:02:39.211515 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 22:02:39.211529 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 22:02:39.211544 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Feb 12 22:02:39.211559 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 22:02:39.211574 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 22:02:39.211589 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Feb 12 22:02:39.211604 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 22:02:39.211619 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 22:02:39.211634 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 22:02:39.211665 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 22:02:39.211676 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 22:02:39.211688 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 22:02:39.211701 kernel: TSC deadline timer available Feb 12 22:02:39.211714 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 22:02:39.211727 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Feb 12 22:02:39.211758 kernel: Booting paravirtualized kernel on KVM Feb 12 22:02:39.211772 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 22:02:39.211786 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 22:02:39.211803 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 22:02:39.211814 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 22:02:39.211828 kernel: pcpu-alloc: [0] 0 1 Feb 12 22:02:39.211841 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Feb 12 22:02:39.211855 kernel: kvm-guest: PV spinlocks enabled Feb 12 22:02:39.211869 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 22:02:39.211882 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Feb 12 22:02:39.211896 kernel: Policy zone: DMA32 Feb 12 22:02:39.211912 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:02:39.211929 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 22:02:39.211943 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 22:02:39.211957 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 22:02:39.211971 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 22:02:39.211985 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved) Feb 12 22:02:39.212000 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 22:02:39.212013 kernel: Kernel/User page tables isolation: enabled Feb 12 22:02:39.212028 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 22:02:39.212044 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 22:02:39.212058 kernel: rcu: Hierarchical RCU implementation. Feb 12 22:02:39.212073 kernel: rcu: RCU event tracing is enabled. Feb 12 22:02:39.212087 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 22:02:39.212101 kernel: Rude variant of Tasks RCU enabled. Feb 12 22:02:39.212115 kernel: Tracing variant of Tasks RCU enabled. Feb 12 22:02:39.212230 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 22:02:39.212246 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 22:02:39.212260 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 22:02:39.212274 kernel: random: crng init done Feb 12 22:02:39.212291 kernel: Console: colour VGA+ 80x25 Feb 12 22:02:39.212305 kernel: printk: console [ttyS0] enabled Feb 12 22:02:39.212319 kernel: ACPI: Core revision 20210730 Feb 12 22:02:39.212333 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Feb 12 22:02:39.212347 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 22:02:39.212361 kernel: x2apic enabled Feb 12 22:02:39.212375 kernel: Switched APIC routing to physical x2apic. Feb 12 22:02:39.212389 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Feb 12 22:02:39.212404 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Feb 12 22:02:39.212420 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 22:02:39.212434 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 22:02:39.212449 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 22:02:39.212473 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 22:02:39.212490 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 22:02:39.212505 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 22:02:39.212520 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 12 22:02:39.212533 kernel: RETBleed: Vulnerable Feb 12 22:02:39.212547 kernel: Speculative Store Bypass: Vulnerable Feb 12 22:02:39.212562 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 22:02:39.212576 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 22:02:39.212590 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 22:02:39.212604 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 22:02:39.212622 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 22:02:39.212636 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 22:02:39.212670 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 12 22:02:39.212684 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 12 22:02:39.212699 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 12 22:02:39.212715 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 12 22:02:39.212735 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 12 22:02:39.212751 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Feb 12 22:02:39.212767 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 22:02:39.212782 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 12 22:02:39.212797 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 12 22:02:39.212824 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Feb 12 22:02:39.212839 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Feb 12 22:02:39.212854 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Feb 12 22:02:39.212869 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Feb 12 22:02:39.212886 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Feb 12 22:02:39.212903 kernel: Freeing SMP alternatives memory: 32K Feb 12 22:02:39.212921 kernel: pid_max: default: 32768 minimum: 301 Feb 12 22:02:39.212936 kernel: LSM: Security Framework initializing Feb 12 22:02:39.212952 kernel: SELinux: Initializing. Feb 12 22:02:39.212968 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:02:39.212983 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:02:39.212998 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8175M CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x4) Feb 12 22:02:39.213014 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 12 22:02:39.213030 kernel: signal: max sigframe size: 3632 Feb 12 22:02:39.213046 kernel: rcu: Hierarchical SRCU implementation. Feb 12 22:02:39.213062 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 22:02:39.213077 kernel: smp: Bringing up secondary CPUs ... Feb 12 22:02:39.213096 kernel: x86: Booting SMP configuration: Feb 12 22:02:39.213111 kernel: .... node #0, CPUs: #1 Feb 12 22:02:39.213126 kernel: kvm-clock: cpu 1, msr 74faa041, secondary cpu clock Feb 12 22:02:39.213142 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Feb 12 22:02:39.213159 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 12 22:02:39.213175 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 22:02:39.213192 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 22:02:39.213207 kernel: smpboot: Max logical packages: 1 Feb 12 22:02:39.213225 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Feb 12 22:02:39.213332 kernel: devtmpfs: initialized Feb 12 22:02:39.213352 kernel: x86/mm: Memory block size: 128MB Feb 12 22:02:39.213386 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 22:02:39.213403 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 22:02:39.213420 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 22:02:39.213437 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 22:02:39.213453 kernel: audit: initializing netlink subsys (disabled) Feb 12 22:02:39.213470 kernel: audit: type=2000 audit(1707775359.022:1): state=initialized audit_enabled=0 res=1 Feb 12 22:02:39.213490 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 22:02:39.213506 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 22:02:39.213594 kernel: cpuidle: using governor menu Feb 12 22:02:39.213611 kernel: ACPI: bus type PCI registered Feb 12 22:02:39.213628 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 22:02:39.213721 kernel: dca service started, version 1.12.1 Feb 12 22:02:39.213739 kernel: PCI: Using configuration type 1 for base access Feb 12 22:02:39.213755 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 22:02:39.213779 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 22:02:39.213801 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 22:02:39.213816 kernel: ACPI: Added _OSI(Module Device) Feb 12 22:02:39.213832 kernel: ACPI: Added _OSI(Processor Device) Feb 12 22:02:39.213848 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 22:02:39.213865 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 22:02:39.213881 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 22:02:39.213897 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 22:02:39.213913 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 22:02:39.213929 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 12 22:02:39.213947 kernel: ACPI: Interpreter enabled Feb 12 22:02:39.213963 kernel: ACPI: PM: (supports S0 S5) Feb 12 22:02:39.213979 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 22:02:39.213995 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 22:02:39.214012 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 12 22:02:39.214029 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 22:02:39.214256 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 22:02:39.214512 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 22:02:39.214542 kernel: acpiphp: Slot [3] registered Feb 12 22:02:39.214559 kernel: acpiphp: Slot [4] registered Feb 12 22:02:39.214575 kernel: acpiphp: Slot [5] registered Feb 12 22:02:39.214591 kernel: acpiphp: Slot [6] registered Feb 12 22:02:39.214606 kernel: acpiphp: Slot [7] registered Feb 12 22:02:39.214622 kernel: acpiphp: Slot [8] registered Feb 12 22:02:39.214639 kernel: acpiphp: Slot [9] registered Feb 12 22:02:39.214674 kernel: acpiphp: Slot [10] registered Feb 12 22:02:39.214689 kernel: acpiphp: Slot [11] registered Feb 12 22:02:39.214706 kernel: acpiphp: Slot [12] registered Feb 12 22:02:39.214721 kernel: acpiphp: Slot [13] registered Feb 12 22:02:39.214736 kernel: acpiphp: Slot [14] registered Feb 12 22:02:39.214751 kernel: acpiphp: Slot [15] registered Feb 12 22:02:39.214764 kernel: acpiphp: Slot [16] registered Feb 12 22:02:39.214777 kernel: acpiphp: Slot [17] registered Feb 12 22:02:39.214792 kernel: acpiphp: Slot [18] registered Feb 12 22:02:39.214807 kernel: acpiphp: Slot [19] registered Feb 12 22:02:39.214821 kernel: acpiphp: Slot [20] registered Feb 12 22:02:39.214836 kernel: acpiphp: Slot [21] registered Feb 12 22:02:39.214854 kernel: acpiphp: Slot [22] registered Feb 12 22:02:39.214869 kernel: acpiphp: Slot [23] registered Feb 12 22:02:39.214895 kernel: acpiphp: Slot [24] registered Feb 12 22:02:39.214909 kernel: acpiphp: Slot [25] registered Feb 12 22:02:39.214923 kernel: acpiphp: Slot [26] registered Feb 12 22:02:39.214935 kernel: acpiphp: Slot [27] registered Feb 12 22:02:39.214950 kernel: acpiphp: Slot [28] registered Feb 12 22:02:39.214965 kernel: acpiphp: Slot [29] registered Feb 12 22:02:39.214979 kernel: acpiphp: Slot [30] registered Feb 12 22:02:39.214997 kernel: acpiphp: Slot [31] registered Feb 12 22:02:39.215012 kernel: PCI host bridge to bus 0000:00 Feb 12 22:02:39.215165 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 22:02:39.215378 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 22:02:39.215607 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 22:02:39.215741 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 22:02:39.215853 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 22:02:39.215992 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 22:02:39.216134 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 22:02:39.216367 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Feb 12 22:02:39.216502 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 22:02:39.216756 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 12 22:02:39.216898 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Feb 12 22:02:39.228085 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Feb 12 22:02:39.228231 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Feb 12 22:02:39.228352 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Feb 12 22:02:39.228468 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Feb 12 22:02:39.228584 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Feb 12 22:02:39.228723 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 16601 usecs Feb 12 22:02:39.228852 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Feb 12 22:02:39.229248 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Feb 12 22:02:39.229386 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 12 22:02:39.229503 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 22:02:39.229630 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 12 22:02:39.229775 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Feb 12 22:02:39.229919 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 12 22:02:39.230176 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Feb 12 22:02:39.230207 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 22:02:39.230225 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 22:02:39.230241 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 22:02:39.230258 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 22:02:39.230275 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 22:02:39.230292 kernel: iommu: Default domain type: Translated Feb 12 22:02:39.230309 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 22:02:39.230443 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Feb 12 22:02:39.230577 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 22:02:39.230732 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Feb 12 22:02:39.230751 kernel: vgaarb: loaded Feb 12 22:02:39.230768 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 22:02:39.230783 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 22:02:39.230799 kernel: PTP clock support registered Feb 12 22:02:39.230815 kernel: PCI: Using ACPI for IRQ routing Feb 12 22:02:39.230829 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 22:02:39.230844 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 22:02:39.230859 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Feb 12 22:02:39.230877 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 12 22:02:39.231004 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Feb 12 22:02:39.231021 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 22:02:39.231037 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 22:02:39.231053 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 22:02:39.231068 kernel: pnp: PnP ACPI init Feb 12 22:02:39.231083 kernel: pnp: PnP ACPI: found 5 devices Feb 12 22:02:39.231099 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 22:02:39.231117 kernel: NET: Registered PF_INET protocol family Feb 12 22:02:39.232028 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 22:02:39.232044 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 22:02:39.232059 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 22:02:39.232074 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 22:02:39.232089 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 22:02:39.232104 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 22:02:39.232120 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:02:39.232135 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:02:39.232153 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 22:02:39.232168 kernel: NET: Registered PF_XDP protocol family Feb 12 22:02:39.232423 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 22:02:39.232540 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 22:02:39.232666 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 22:02:39.232780 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 22:02:39.233223 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 22:02:39.233802 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 22:02:39.233881 kernel: PCI: CLS 0 bytes, default 64 Feb 12 22:02:39.233898 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 22:02:39.233952 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Feb 12 22:02:39.233969 kernel: clocksource: Switched to clocksource tsc Feb 12 22:02:39.233984 kernel: Initialise system trusted keyrings Feb 12 22:02:39.234209 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 22:02:39.234227 kernel: Key type asymmetric registered Feb 12 22:02:39.234283 kernel: Asymmetric key parser 'x509' registered Feb 12 22:02:39.234302 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 22:02:39.234316 kernel: io scheduler mq-deadline registered Feb 12 22:02:39.234329 kernel: io scheduler kyber registered Feb 12 22:02:39.234343 kernel: io scheduler bfq registered Feb 12 22:02:39.234358 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 22:02:39.234372 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 22:02:39.234386 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 22:02:39.234399 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 22:02:39.234414 kernel: i8042: Warning: Keylock active Feb 12 22:02:39.234430 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 22:02:39.234449 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 22:02:39.234718 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 12 22:02:39.234845 kernel: rtc_cmos 00:00: registered as rtc0 Feb 12 22:02:39.234966 kernel: rtc_cmos 00:00: setting system clock to 2024-02-12T22:02:38 UTC (1707775358) Feb 12 22:02:39.235083 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 12 22:02:39.235101 kernel: intel_pstate: CPU model not supported Feb 12 22:02:39.235117 kernel: NET: Registered PF_INET6 protocol family Feb 12 22:02:39.235136 kernel: Segment Routing with IPv6 Feb 12 22:02:39.235150 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 22:02:39.235412 kernel: NET: Registered PF_PACKET protocol family Feb 12 22:02:39.235430 kernel: Key type dns_resolver registered Feb 12 22:02:39.235442 kernel: IPI shorthand broadcast: enabled Feb 12 22:02:39.235457 kernel: sched_clock: Marking stable (517285374, 311225468)->(954581294, -126070452) Feb 12 22:02:39.235471 kernel: registered taskstats version 1 Feb 12 22:02:39.235484 kernel: Loading compiled-in X.509 certificates Feb 12 22:02:39.235496 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 22:02:39.235513 kernel: Key type .fscrypt registered Feb 12 22:02:39.235527 kernel: Key type fscrypt-provisioning registered Feb 12 22:02:39.235540 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 22:02:39.235554 kernel: ima: Allocated hash algorithm: sha1 Feb 12 22:02:39.235568 kernel: ima: No architecture policies found Feb 12 22:02:39.235694 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 22:02:39.235709 kernel: Write protecting the kernel read-only data: 28672k Feb 12 22:02:39.235722 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 22:02:39.235735 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 22:02:39.235754 kernel: Run /init as init process Feb 12 22:02:39.235769 kernel: with arguments: Feb 12 22:02:39.235782 kernel: /init Feb 12 22:02:39.235797 kernel: with environment: Feb 12 22:02:39.235810 kernel: HOME=/ Feb 12 22:02:39.235823 kernel: TERM=linux Feb 12 22:02:39.235835 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 22:02:39.235854 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:02:39.235876 systemd[1]: Detected virtualization amazon. Feb 12 22:02:39.235893 systemd[1]: Detected architecture x86-64. Feb 12 22:02:39.235907 systemd[1]: Running in initrd. Feb 12 22:02:39.235921 systemd[1]: No hostname configured, using default hostname. Feb 12 22:02:39.235952 systemd[1]: Hostname set to . Feb 12 22:02:39.235975 systemd[1]: Initializing machine ID from VM UUID. Feb 12 22:02:39.235991 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 22:02:39.236008 systemd[1]: Queued start job for default target initrd.target. Feb 12 22:02:39.236025 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:02:39.236040 systemd[1]: Reached target cryptsetup.target. Feb 12 22:02:39.236055 systemd[1]: Reached target paths.target. Feb 12 22:02:39.236071 systemd[1]: Reached target slices.target. Feb 12 22:02:39.236086 systemd[1]: Reached target swap.target. Feb 12 22:02:39.236101 systemd[1]: Reached target timers.target. Feb 12 22:02:39.236122 systemd[1]: Listening on iscsid.socket. Feb 12 22:02:39.236139 systemd[1]: Listening on iscsiuio.socket. Feb 12 22:02:39.236155 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 22:02:39.236170 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 22:02:39.236185 systemd[1]: Listening on systemd-journald.socket. Feb 12 22:02:39.236201 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:02:39.236217 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:02:39.236232 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:02:39.236250 systemd[1]: Reached target sockets.target. Feb 12 22:02:39.236270 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:02:39.236298 systemd[1]: Finished network-cleanup.service. Feb 12 22:02:39.236315 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 22:02:39.236330 systemd[1]: Starting systemd-journald.service... Feb 12 22:02:39.236346 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:02:39.236360 systemd[1]: Starting systemd-resolved.service... Feb 12 22:02:39.236377 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 22:02:39.236395 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:02:39.236415 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 22:02:39.236437 systemd-journald[185]: Journal started Feb 12 22:02:39.236829 systemd-journald[185]: Runtime Journal (/run/log/journal/ec28dd04e26a507ad90e6aecb9927e1d) is 4.8M, max 38.7M, 33.9M free. Feb 12 22:02:39.224859 systemd-resolved[187]: Positive Trust Anchors: Feb 12 22:02:39.422060 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 22:02:39.422088 kernel: Bridge firewalling registered Feb 12 22:02:39.422101 kernel: SCSI subsystem initialized Feb 12 22:02:39.422113 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 22:02:39.422130 kernel: device-mapper: uevent: version 1.0.3 Feb 12 22:02:39.422145 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 22:02:39.224874 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:02:39.432167 systemd[1]: Started systemd-resolved.service. Feb 12 22:02:39.432207 kernel: audit: type=1130 audit(1707775359.421:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.224948 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:02:39.234866 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 12 22:02:39.464980 systemd[1]: Started systemd-journald.service. Feb 12 22:02:39.465015 kernel: audit: type=1130 audit(1707775359.441:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.465032 kernel: audit: type=1130 audit(1707775359.451:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.237930 systemd-modules-load[186]: Inserted module 'overlay' Feb 12 22:02:39.283680 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 12 22:02:39.339962 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 12 22:02:39.480833 kernel: audit: type=1130 audit(1707775359.469:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.453243 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:02:39.469878 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 22:02:39.481173 systemd[1]: Reached target nss-lookup.target. Feb 12 22:02:39.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.487536 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 22:02:39.496408 kernel: audit: type=1130 audit(1707775359.480:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.497404 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:02:39.500542 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:02:39.533329 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:02:39.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.549204 kernel: audit: type=1130 audit(1707775359.532:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.550989 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:02:39.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.562720 kernel: audit: type=1130 audit(1707775359.553:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.562992 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 22:02:39.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.577787 kernel: audit: type=1130 audit(1707775359.566:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.569098 systemd[1]: Starting dracut-cmdline.service... Feb 12 22:02:39.585807 dracut-cmdline[206]: dracut-dracut-053 Feb 12 22:02:39.589166 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:02:39.682673 kernel: Loading iSCSI transport class v2.0-870. Feb 12 22:02:39.697720 kernel: iscsi: registered transport (tcp) Feb 12 22:02:39.723681 kernel: iscsi: registered transport (qla4xxx) Feb 12 22:02:39.723758 kernel: QLogic iSCSI HBA Driver Feb 12 22:02:39.801499 systemd[1]: Finished dracut-cmdline.service. Feb 12 22:02:39.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.810691 kernel: audit: type=1130 audit(1707775359.802:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.804153 systemd[1]: Starting dracut-pre-udev.service... Feb 12 22:02:39.868728 kernel: raid6: avx512x4 gen() 15310 MB/s Feb 12 22:02:39.886702 kernel: raid6: avx512x4 xor() 7549 MB/s Feb 12 22:02:39.904690 kernel: raid6: avx512x2 gen() 17050 MB/s Feb 12 22:02:39.922697 kernel: raid6: avx512x2 xor() 22888 MB/s Feb 12 22:02:39.940696 kernel: raid6: avx512x1 gen() 16702 MB/s Feb 12 22:02:39.958688 kernel: raid6: avx512x1 xor() 17298 MB/s Feb 12 22:02:39.976695 kernel: raid6: avx2x4 gen() 16864 MB/s Feb 12 22:02:40.000685 kernel: raid6: avx2x4 xor() 6413 MB/s Feb 12 22:02:40.021045 kernel: raid6: avx2x2 gen() 9796 MB/s Feb 12 22:02:40.039707 kernel: raid6: avx2x2 xor() 9426 MB/s Feb 12 22:02:40.059729 kernel: raid6: avx2x1 gen() 8195 MB/s Feb 12 22:02:40.077708 kernel: raid6: avx2x1 xor() 7976 MB/s Feb 12 22:02:40.095693 kernel: raid6: sse2x4 gen() 8784 MB/s Feb 12 22:02:40.113688 kernel: raid6: sse2x4 xor() 5399 MB/s Feb 12 22:02:40.131680 kernel: raid6: sse2x2 gen() 10082 MB/s Feb 12 22:02:40.149691 kernel: raid6: sse2x2 xor() 5720 MB/s Feb 12 22:02:40.167691 kernel: raid6: sse2x1 gen() 8844 MB/s Feb 12 22:02:40.186590 kernel: raid6: sse2x1 xor() 4495 MB/s Feb 12 22:02:40.186688 kernel: raid6: using algorithm avx512x2 gen() 17050 MB/s Feb 12 22:02:40.186714 kernel: raid6: .... xor() 22888 MB/s, rmw enabled Feb 12 22:02:40.188000 kernel: raid6: using avx512x2 recovery algorithm Feb 12 22:02:40.204674 kernel: xor: automatically using best checksumming function avx Feb 12 22:02:40.343131 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 22:02:40.360813 systemd[1]: Finished dracut-pre-udev.service. Feb 12 22:02:40.365117 systemd[1]: Starting systemd-udevd.service... Feb 12 22:02:40.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:40.364000 audit: BPF prog-id=7 op=LOAD Feb 12 22:02:40.364000 audit: BPF prog-id=8 op=LOAD Feb 12 22:02:40.385564 systemd-udevd[383]: Using default interface naming scheme 'v252'. Feb 12 22:02:40.392019 systemd[1]: Started systemd-udevd.service. Feb 12 22:02:40.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:40.394496 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 22:02:40.414719 dracut-pre-trigger[387]: rd.md=0: removing MD RAID activation Feb 12 22:02:40.450676 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 22:02:40.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:40.453048 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:02:40.509171 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:02:40.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:40.596681 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 22:02:40.610019 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 12 22:02:40.610297 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 12 22:02:40.628617 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Feb 12 22:02:40.630674 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:07:72:ec:1e:63 Feb 12 22:02:40.633216 (udev-worker)[432]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:02:40.880449 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 22:02:40.880481 kernel: AES CTR mode by8 optimization enabled Feb 12 22:02:40.880500 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 12 22:02:40.880761 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 22:02:40.880790 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 12 22:02:40.880946 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 22:02:40.880973 kernel: GPT:9289727 != 16777215 Feb 12 22:02:40.880994 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 22:02:40.881014 kernel: GPT:9289727 != 16777215 Feb 12 22:02:40.881034 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 22:02:40.881053 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:02:40.881074 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (435) Feb 12 22:02:40.815189 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 22:02:40.888791 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 22:02:40.902954 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 22:02:40.923146 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:02:40.930245 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 22:02:40.935050 systemd[1]: Starting disk-uuid.service... Feb 12 22:02:40.944936 disk-uuid[587]: Primary Header is updated. Feb 12 22:02:40.944936 disk-uuid[587]: Secondary Entries is updated. Feb 12 22:02:40.944936 disk-uuid[587]: Secondary Header is updated. Feb 12 22:02:40.952673 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:02:40.958680 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:02:41.966673 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:02:41.967301 disk-uuid[588]: The operation has completed successfully. Feb 12 22:02:42.165552 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 22:02:42.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.165693 systemd[1]: Finished disk-uuid.service. Feb 12 22:02:42.184832 systemd[1]: Starting verity-setup.service... Feb 12 22:02:42.217676 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 22:02:42.321571 systemd[1]: Found device dev-mapper-usr.device. Feb 12 22:02:42.323592 systemd[1]: Mounting sysusr-usr.mount... Feb 12 22:02:42.328063 systemd[1]: Finished verity-setup.service. Feb 12 22:02:42.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.439676 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 22:02:42.440334 systemd[1]: Mounted sysusr-usr.mount. Feb 12 22:02:42.442704 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 22:02:42.445913 systemd[1]: Starting ignition-setup.service... Feb 12 22:02:42.448584 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 22:02:42.487476 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:02:42.487553 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:02:42.487575 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:02:42.505823 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:02:42.521344 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 22:02:42.555703 systemd[1]: Finished ignition-setup.service. Feb 12 22:02:42.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.558227 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 22:02:42.564622 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 22:02:42.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.567000 audit: BPF prog-id=9 op=LOAD Feb 12 22:02:42.568609 systemd[1]: Starting systemd-networkd.service... Feb 12 22:02:42.596701 systemd-networkd[1100]: lo: Link UP Feb 12 22:02:42.596710 systemd-networkd[1100]: lo: Gained carrier Feb 12 22:02:42.597423 systemd-networkd[1100]: Enumeration completed Feb 12 22:02:42.598008 systemd[1]: Started systemd-networkd.service. Feb 12 22:02:42.599122 systemd-networkd[1100]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:02:42.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.620454 systemd[1]: Reached target network.target. Feb 12 22:02:42.623618 systemd[1]: Starting iscsiuio.service... Feb 12 22:02:42.625637 systemd-networkd[1100]: eth0: Link UP Feb 12 22:02:42.625668 systemd-networkd[1100]: eth0: Gained carrier Feb 12 22:02:42.637009 systemd[1]: Started iscsiuio.service. Feb 12 22:02:42.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.638928 systemd[1]: Starting iscsid.service... Feb 12 22:02:42.646279 iscsid[1105]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:02:42.646279 iscsid[1105]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 22:02:42.646279 iscsid[1105]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 22:02:42.646279 iscsid[1105]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 22:02:42.646279 iscsid[1105]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:02:42.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.665965 iscsid[1105]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 22:02:42.659424 systemd[1]: Started iscsid.service. Feb 12 22:02:42.665703 systemd[1]: Starting dracut-initqueue.service... Feb 12 22:02:42.668769 systemd-networkd[1100]: eth0: DHCPv4 address 172.31.19.213/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 22:02:42.684794 systemd[1]: Finished dracut-initqueue.service. Feb 12 22:02:42.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.686425 systemd[1]: Reached target remote-fs-pre.target. Feb 12 22:02:42.687942 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:02:42.691998 systemd[1]: Reached target remote-fs.target. Feb 12 22:02:42.699324 systemd[1]: Starting dracut-pre-mount.service... Feb 12 22:02:42.717850 systemd[1]: Finished dracut-pre-mount.service. Feb 12 22:02:42.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.856050 ignition[1098]: Ignition 2.14.0 Feb 12 22:02:42.856065 ignition[1098]: Stage: fetch-offline Feb 12 22:02:42.856205 ignition[1098]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:42.856261 ignition[1098]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:42.875754 ignition[1098]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:42.877662 ignition[1098]: Ignition finished successfully Feb 12 22:02:42.880057 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 22:02:42.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.884969 systemd[1]: Starting ignition-fetch.service... Feb 12 22:02:42.900792 ignition[1124]: Ignition 2.14.0 Feb 12 22:02:42.900808 ignition[1124]: Stage: fetch Feb 12 22:02:42.901001 ignition[1124]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:42.901032 ignition[1124]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:42.911955 ignition[1124]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:42.914132 ignition[1124]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:42.957353 ignition[1124]: INFO : PUT result: OK Feb 12 22:02:42.960108 ignition[1124]: DEBUG : parsed url from cmdline: "" Feb 12 22:02:42.960108 ignition[1124]: INFO : no config URL provided Feb 12 22:02:42.960108 ignition[1124]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 12 22:02:42.960108 ignition[1124]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 12 22:02:42.967774 ignition[1124]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:42.967774 ignition[1124]: INFO : PUT result: OK Feb 12 22:02:42.967774 ignition[1124]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 12 22:02:42.975060 ignition[1124]: INFO : GET result: OK Feb 12 22:02:42.976084 ignition[1124]: DEBUG : parsing config with SHA512: 224794355b10ee794db22705e09ad47609659ef469ad453021661469e9a09fea8bbd8b4b923a8bcd5f5578efb45df71f186c0855dabcbc579ab86a606276558e Feb 12 22:02:42.996591 unknown[1124]: fetched base config from "system" Feb 12 22:02:42.996962 unknown[1124]: fetched base config from "system" Feb 12 22:02:42.997749 ignition[1124]: fetch: fetch complete Feb 12 22:02:42.996970 unknown[1124]: fetched user config from "aws" Feb 12 22:02:42.997756 ignition[1124]: fetch: fetch passed Feb 12 22:02:42.997801 ignition[1124]: Ignition finished successfully Feb 12 22:02:43.009919 systemd[1]: Finished ignition-fetch.service. Feb 12 22:02:43.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.012117 systemd[1]: Starting ignition-kargs.service... Feb 12 22:02:43.025626 ignition[1130]: Ignition 2.14.0 Feb 12 22:02:43.025638 ignition[1130]: Stage: kargs Feb 12 22:02:43.025880 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:43.025916 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:43.035313 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:43.037216 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:43.040613 ignition[1130]: INFO : PUT result: OK Feb 12 22:02:43.044257 ignition[1130]: kargs: kargs passed Feb 12 22:02:43.044329 ignition[1130]: Ignition finished successfully Feb 12 22:02:43.046967 systemd[1]: Finished ignition-kargs.service. Feb 12 22:02:43.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.050218 systemd[1]: Starting ignition-disks.service... Feb 12 22:02:43.062257 ignition[1136]: Ignition 2.14.0 Feb 12 22:02:43.062271 ignition[1136]: Stage: disks Feb 12 22:02:43.062474 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:43.062511 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:43.072234 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:43.074270 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:43.076932 ignition[1136]: INFO : PUT result: OK Feb 12 22:02:43.080045 ignition[1136]: disks: disks passed Feb 12 22:02:43.080200 ignition[1136]: Ignition finished successfully Feb 12 22:02:43.083348 systemd[1]: Finished ignition-disks.service. Feb 12 22:02:43.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.084963 systemd[1]: Reached target initrd-root-device.target. Feb 12 22:02:43.105928 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 12 22:02:43.105962 kernel: audit: type=1130 audit(1707775363.084:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.105940 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:02:43.108378 systemd[1]: Reached target local-fs.target. Feb 12 22:02:43.109779 systemd[1]: Reached target sysinit.target. Feb 12 22:02:43.115751 systemd[1]: Reached target basic.target. Feb 12 22:02:43.119404 systemd[1]: Starting systemd-fsck-root.service... Feb 12 22:02:43.149631 systemd-fsck[1144]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 22:02:43.156902 systemd[1]: Finished systemd-fsck-root.service. Feb 12 22:02:43.158511 systemd[1]: Mounting sysroot.mount... Feb 12 22:02:43.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.168669 kernel: audit: type=1130 audit(1707775363.156:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.181918 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 22:02:43.183026 systemd[1]: Mounted sysroot.mount. Feb 12 22:02:43.188172 systemd[1]: Reached target initrd-root-fs.target. Feb 12 22:02:43.194265 systemd[1]: Mounting sysroot-usr.mount... Feb 12 22:02:43.197549 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 22:02:43.197771 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 22:02:43.197818 systemd[1]: Reached target ignition-diskful.target. Feb 12 22:02:43.208092 systemd[1]: Mounted sysroot-usr.mount. Feb 12 22:02:43.212444 systemd[1]: Starting initrd-setup-root.service... Feb 12 22:02:43.222300 initrd-setup-root[1165]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 22:02:43.251261 initrd-setup-root[1173]: cut: /sysroot/etc/group: No such file or directory Feb 12 22:02:43.258795 initrd-setup-root[1181]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 22:02:43.265098 initrd-setup-root[1189]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 22:02:43.357082 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:02:43.373677 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1198) Feb 12 22:02:43.373784 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:02:43.377412 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:02:43.377486 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:02:43.388874 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:02:43.393788 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:02:43.400946 systemd[1]: Finished initrd-setup-root.service. Feb 12 22:02:43.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.410216 kernel: audit: type=1130 audit(1707775363.403:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.404885 systemd[1]: Starting ignition-mount.service... Feb 12 22:02:43.411069 systemd[1]: Starting sysroot-boot.service... Feb 12 22:02:43.418298 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 22:02:43.418400 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 22:02:43.460488 ignition[1228]: INFO : Ignition 2.14.0 Feb 12 22:02:43.460488 ignition[1228]: INFO : Stage: mount Feb 12 22:02:43.463762 ignition[1228]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:43.463762 ignition[1228]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:43.466453 systemd[1]: Finished sysroot-boot.service. Feb 12 22:02:43.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.483717 kernel: audit: type=1130 audit(1707775363.472:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.489120 ignition[1228]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:43.493062 ignition[1228]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:43.495840 ignition[1228]: INFO : PUT result: OK Feb 12 22:02:43.499943 ignition[1228]: INFO : mount: mount passed Feb 12 22:02:43.501360 ignition[1228]: INFO : Ignition finished successfully Feb 12 22:02:43.501364 systemd[1]: Finished ignition-mount.service. Feb 12 22:02:43.515800 kernel: audit: type=1130 audit(1707775363.504:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:43.506427 systemd[1]: Starting ignition-files.service... Feb 12 22:02:43.523344 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:02:43.559790 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1237) Feb 12 22:02:43.566510 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:02:43.566578 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:02:43.566600 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:02:43.579676 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:02:43.584665 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:02:43.597960 ignition[1256]: INFO : Ignition 2.14.0 Feb 12 22:02:43.597960 ignition[1256]: INFO : Stage: files Feb 12 22:02:43.607050 ignition[1256]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:43.607050 ignition[1256]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:43.617901 ignition[1256]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:43.621597 ignition[1256]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:43.624721 ignition[1256]: INFO : PUT result: OK Feb 12 22:02:43.629659 ignition[1256]: DEBUG : files: compiled without relabeling support, skipping Feb 12 22:02:43.634875 ignition[1256]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 22:02:43.634875 ignition[1256]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 22:02:43.641432 ignition[1256]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 22:02:43.643783 ignition[1256]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 22:02:43.647229 unknown[1256]: wrote ssh authorized keys file for user: core Feb 12 22:02:43.648876 ignition[1256]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 22:02:43.651929 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 22:02:43.655078 ignition[1256]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 22:02:44.125427 ignition[1256]: INFO : GET result: OK Feb 12 22:02:44.278313 systemd-networkd[1100]: eth0: Gained IPv6LL Feb 12 22:02:44.419227 ignition[1256]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 22:02:44.422929 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 22:02:44.422929 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 22:02:44.422929 ignition[1256]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 22:02:44.798293 ignition[1256]: INFO : GET result: OK Feb 12 22:02:44.934096 ignition[1256]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 22:02:44.938482 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 22:02:44.938482 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 22:02:44.947483 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:02:44.956890 ignition[1256]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem955616764" Feb 12 22:02:44.963527 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1258) Feb 12 22:02:44.963563 ignition[1256]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem955616764": device or resource busy Feb 12 22:02:44.963563 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem955616764", trying btrfs: device or resource busy Feb 12 22:02:44.963563 ignition[1256]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem955616764" Feb 12 22:02:44.977289 ignition[1256]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem955616764" Feb 12 22:02:44.977289 ignition[1256]: INFO : op(3): [started] unmounting "/mnt/oem955616764" Feb 12 22:02:44.977289 ignition[1256]: INFO : op(3): [finished] unmounting "/mnt/oem955616764" Feb 12 22:02:44.977289 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 22:02:44.977289 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:02:44.977289 ignition[1256]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 12 22:02:44.987518 systemd[1]: mnt-oem955616764.mount: Deactivated successfully. Feb 12 22:02:45.103146 ignition[1256]: INFO : GET result: OK Feb 12 22:02:45.420006 ignition[1256]: DEBUG : file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 12 22:02:45.424133 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:02:45.424133 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:02:45.424133 ignition[1256]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 12 22:02:45.486940 ignition[1256]: INFO : GET result: OK Feb 12 22:02:46.183294 ignition[1256]: DEBUG : file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 12 22:02:46.188157 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:02:46.188157 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/install.sh" Feb 12 22:02:46.188157 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 22:02:46.188157 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:02:46.217893 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:02:46.217893 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:02:46.217893 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:02:46.217893 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 22:02:46.217893 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:02:46.237852 ignition[1256]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4293635878" Feb 12 22:02:46.240093 ignition[1256]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4293635878": device or resource busy Feb 12 22:02:46.240093 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4293635878", trying btrfs: device or resource busy Feb 12 22:02:46.240093 ignition[1256]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4293635878" Feb 12 22:02:46.249018 ignition[1256]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4293635878" Feb 12 22:02:46.251370 ignition[1256]: INFO : op(6): [started] unmounting "/mnt/oem4293635878" Feb 12 22:02:46.250537 systemd[1]: mnt-oem4293635878.mount: Deactivated successfully. Feb 12 22:02:46.255698 ignition[1256]: INFO : op(6): [finished] unmounting "/mnt/oem4293635878" Feb 12 22:02:46.255698 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 22:02:46.255698 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 22:02:46.255698 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:02:46.270780 ignition[1256]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem462086488" Feb 12 22:02:46.273448 ignition[1256]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem462086488": device or resource busy Feb 12 22:02:46.273448 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem462086488", trying btrfs: device or resource busy Feb 12 22:02:46.273448 ignition[1256]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem462086488" Feb 12 22:02:46.273448 ignition[1256]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem462086488" Feb 12 22:02:46.283499 ignition[1256]: INFO : op(9): [started] unmounting "/mnt/oem462086488" Feb 12 22:02:46.283499 ignition[1256]: INFO : op(9): [finished] unmounting "/mnt/oem462086488" Feb 12 22:02:46.283499 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 22:02:46.284122 systemd[1]: mnt-oem462086488.mount: Deactivated successfully. Feb 12 22:02:46.293309 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 22:02:46.296466 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:02:46.307972 ignition[1256]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1541482994" Feb 12 22:02:46.310260 ignition[1256]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1541482994": device or resource busy Feb 12 22:02:46.313027 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1541482994", trying btrfs: device or resource busy Feb 12 22:02:46.313027 ignition[1256]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1541482994" Feb 12 22:02:46.319562 ignition[1256]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1541482994" Feb 12 22:02:46.321598 ignition[1256]: INFO : op(c): [started] unmounting "/mnt/oem1541482994" Feb 12 22:02:46.321598 ignition[1256]: INFO : op(c): [finished] unmounting "/mnt/oem1541482994" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(e): [started] processing unit "nvidia.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(e): [finished] processing unit "nvidia.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(12): [started] processing unit "prepare-cni-plugins.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(12): op(13): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(12): op(13): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(12): [finished] processing unit "prepare-cni-plugins.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(14): [started] processing unit "prepare-critools.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(14): op(15): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(14): op(15): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(14): [finished] processing unit "prepare-critools.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(16): [started] setting preset to enabled for "nvidia.service" Feb 12 22:02:46.325020 ignition[1256]: INFO : files: op(16): [finished] setting preset to enabled for "nvidia.service" Feb 12 22:02:46.385958 ignition[1256]: INFO : files: op(17): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 22:02:46.385958 ignition[1256]: INFO : files: op(17): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 22:02:46.385958 ignition[1256]: INFO : files: op(18): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 22:02:46.385958 ignition[1256]: INFO : files: op(18): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 22:02:46.385958 ignition[1256]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:02:46.385958 ignition[1256]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:02:46.385958 ignition[1256]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Feb 12 22:02:46.385958 ignition[1256]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 22:02:46.385958 ignition[1256]: INFO : files: createResultFile: createFiles: op(1b): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:02:46.385958 ignition[1256]: INFO : files: createResultFile: createFiles: op(1b): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:02:46.385958 ignition[1256]: INFO : files: files passed Feb 12 22:02:46.385958 ignition[1256]: INFO : Ignition finished successfully Feb 12 22:02:46.420456 systemd[1]: Finished ignition-files.service. Feb 12 22:02:46.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.436828 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 22:02:46.447468 kernel: audit: type=1130 audit(1707775366.434:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.443355 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 22:02:46.446205 systemd[1]: Starting ignition-quench.service... Feb 12 22:02:46.472675 kernel: audit: type=1130 audit(1707775366.454:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.472719 kernel: audit: type=1131 audit(1707775366.454:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.472858 initrd-setup-root-after-ignition[1281]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 22:02:46.485862 kernel: audit: type=1130 audit(1707775366.472:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.453130 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 22:02:46.453263 systemd[1]: Finished ignition-quench.service. Feb 12 22:02:46.457970 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 22:02:46.473189 systemd[1]: Reached target ignition-complete.target. Feb 12 22:02:46.486700 systemd[1]: Starting initrd-parse-etc.service... Feb 12 22:02:46.525163 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 22:02:46.525394 systemd[1]: Finished initrd-parse-etc.service. Feb 12 22:02:46.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.535658 kernel: audit: type=1130 audit(1707775366.528:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.529032 systemd[1]: Reached target initrd-fs.target. Feb 12 22:02:46.535715 systemd[1]: Reached target initrd.target. Feb 12 22:02:46.537059 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 22:02:46.539428 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 22:02:46.555327 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 22:02:46.557497 systemd[1]: Starting initrd-cleanup.service... Feb 12 22:02:46.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.570504 systemd[1]: Stopped target nss-lookup.target. Feb 12 22:02:46.572669 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 22:02:46.575111 systemd[1]: Stopped target timers.target. Feb 12 22:02:46.577204 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 22:02:46.578603 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 22:02:46.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.580795 systemd[1]: Stopped target initrd.target. Feb 12 22:02:46.583233 systemd[1]: Stopped target basic.target. Feb 12 22:02:46.588181 systemd[1]: Stopped target ignition-complete.target. Feb 12 22:02:46.591469 systemd[1]: Stopped target ignition-diskful.target. Feb 12 22:02:46.593837 systemd[1]: Stopped target initrd-root-device.target. Feb 12 22:02:46.597302 systemd[1]: Stopped target remote-fs.target. Feb 12 22:02:46.600111 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 22:02:46.603091 systemd[1]: Stopped target sysinit.target. Feb 12 22:02:46.605274 systemd[1]: Stopped target local-fs.target. Feb 12 22:02:46.607567 systemd[1]: Stopped target local-fs-pre.target. Feb 12 22:02:46.610427 systemd[1]: Stopped target swap.target. Feb 12 22:02:46.612355 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 22:02:46.613869 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 22:02:46.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.616098 systemd[1]: Stopped target cryptsetup.target. Feb 12 22:02:46.618327 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 22:02:46.620214 systemd[1]: Stopped dracut-initqueue.service. Feb 12 22:02:46.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.624418 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 22:02:46.626096 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 22:02:46.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.628850 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 22:02:46.629817 systemd[1]: Stopped ignition-files.service. Feb 12 22:02:46.633279 systemd[1]: Stopping ignition-mount.service... Feb 12 22:02:46.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.633764 systemd[1]: Stopping iscsid.service... Feb 12 22:02:46.642919 iscsid[1105]: iscsid shutting down. Feb 12 22:02:46.644148 systemd[1]: Stopping sysroot-boot.service... Feb 12 22:02:46.646552 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 22:02:46.646813 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 22:02:46.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.652386 ignition[1294]: INFO : Ignition 2.14.0 Feb 12 22:02:46.652386 ignition[1294]: INFO : Stage: umount Feb 12 22:02:46.652386 ignition[1294]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:46.652386 ignition[1294]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:46.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.649966 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 22:02:46.650130 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 22:02:46.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.670828 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 22:02:46.670959 systemd[1]: Stopped iscsid.service. Feb 12 22:02:46.672504 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 22:02:46.672675 systemd[1]: Finished initrd-cleanup.service. Feb 12 22:02:46.674556 systemd[1]: Stopping iscsiuio.service... Feb 12 22:02:46.682006 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 22:02:46.682222 systemd[1]: Stopped iscsiuio.service. Feb 12 22:02:46.700180 ignition[1294]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:46.703123 ignition[1294]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:46.705394 ignition[1294]: INFO : PUT result: OK Feb 12 22:02:46.708780 ignition[1294]: INFO : umount: umount passed Feb 12 22:02:46.710818 ignition[1294]: INFO : Ignition finished successfully Feb 12 22:02:46.711197 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 22:02:46.711285 systemd[1]: Stopped ignition-mount.service. Feb 12 22:02:46.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.719040 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 22:02:46.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.719098 systemd[1]: Stopped ignition-disks.service. Feb 12 22:02:46.720965 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 22:02:46.721023 systemd[1]: Stopped ignition-kargs.service. Feb 12 22:02:46.722684 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 22:02:46.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.722730 systemd[1]: Stopped ignition-fetch.service. Feb 12 22:02:46.724039 systemd[1]: Stopped target network.target. Feb 12 22:02:46.725072 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 22:02:46.725125 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 22:02:46.726304 systemd[1]: Stopped target paths.target. Feb 12 22:02:46.728687 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 22:02:46.741850 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 22:02:46.745826 systemd[1]: Stopped target slices.target. Feb 12 22:02:46.748405 systemd[1]: Stopped target sockets.target. Feb 12 22:02:46.749683 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 22:02:46.749775 systemd[1]: Closed iscsid.socket. Feb 12 22:02:46.751152 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 22:02:46.751201 systemd[1]: Closed iscsiuio.socket. Feb 12 22:02:46.758844 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 22:02:46.758928 systemd[1]: Stopped ignition-setup.service. Feb 12 22:02:46.760925 systemd[1]: Stopping systemd-networkd.service... Feb 12 22:02:46.789854 systemd-networkd[1100]: eth0: DHCPv6 lease lost Feb 12 22:02:46.790255 systemd[1]: Stopping systemd-resolved.service... Feb 12 22:02:46.804276 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 22:02:46.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.804404 systemd[1]: Stopped systemd-networkd.service. Feb 12 22:02:46.809404 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 22:02:46.809515 systemd[1]: Stopped sysroot-boot.service. Feb 12 22:02:46.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.814316 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 22:02:46.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.819000 audit: BPF prog-id=9 op=UNLOAD Feb 12 22:02:46.814414 systemd[1]: Stopped systemd-resolved.service. Feb 12 22:02:46.819000 audit: BPF prog-id=6 op=UNLOAD Feb 12 22:02:46.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.818201 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 22:02:46.818238 systemd[1]: Closed systemd-networkd.socket. Feb 12 22:02:46.821264 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 22:02:46.821346 systemd[1]: Stopped initrd-setup-root.service. Feb 12 22:02:46.825293 systemd[1]: Stopping network-cleanup.service... Feb 12 22:02:46.831296 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 22:02:46.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.831384 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 22:02:46.833836 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 22:02:46.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.833910 systemd[1]: Stopped systemd-sysctl.service. Feb 12 22:02:46.836387 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 22:02:46.836447 systemd[1]: Stopped systemd-modules-load.service. Feb 12 22:02:46.845566 systemd[1]: Stopping systemd-udevd.service... Feb 12 22:02:46.852236 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 22:02:46.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.852475 systemd[1]: Stopped network-cleanup.service. Feb 12 22:02:46.856566 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 22:02:46.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.856905 systemd[1]: Stopped systemd-udevd.service. Feb 12 22:02:46.861890 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 22:02:46.861952 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 22:02:46.864301 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 22:02:46.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.864346 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 22:02:46.867793 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 22:02:46.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.867855 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 22:02:46.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.870334 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 22:02:46.870375 systemd[1]: Stopped dracut-cmdline.service. Feb 12 22:02:46.877038 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 22:02:46.877093 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 22:02:46.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.883273 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 22:02:46.885657 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 22:02:46.885745 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 22:02:46.887563 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 22:02:46.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.887607 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 22:02:46.890417 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 22:02:46.890464 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 22:02:46.897030 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 22:02:46.897137 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 22:02:46.902917 systemd[1]: Reached target initrd-switch-root.target. Feb 12 22:02:46.919433 systemd[1]: Starting initrd-switch-root.service... Feb 12 22:02:46.936100 systemd[1]: Switching root. Feb 12 22:02:46.959523 systemd-journald[185]: Journal stopped Feb 12 22:02:51.308825 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Feb 12 22:02:51.308927 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 22:02:51.308954 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 22:02:51.308977 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 22:02:51.309001 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 22:02:51.309024 kernel: SELinux: policy capability open_perms=1 Feb 12 22:02:51.309055 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 22:02:51.309078 kernel: SELinux: policy capability always_check_network=0 Feb 12 22:02:51.309101 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 22:02:51.309123 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 22:02:51.309145 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 22:02:51.309168 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 22:02:51.309196 systemd[1]: Successfully loaded SELinux policy in 71.518ms. Feb 12 22:02:51.309238 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.878ms. Feb 12 22:02:51.309267 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:02:51.309291 systemd[1]: Detected virtualization amazon. Feb 12 22:02:51.309308 systemd[1]: Detected architecture x86-64. Feb 12 22:02:51.309326 systemd[1]: Detected first boot. Feb 12 22:02:51.309352 systemd[1]: Initializing machine ID from VM UUID. Feb 12 22:02:51.309369 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 22:02:51.309387 systemd[1]: Populated /etc with preset unit settings. Feb 12 22:02:51.309406 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:02:51.309429 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:02:51.309451 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:02:51.309473 kernel: kauditd_printk_skb: 54 callbacks suppressed Feb 12 22:02:51.309492 kernel: audit: type=1334 audit(1707775370.845:88): prog-id=12 op=LOAD Feb 12 22:02:51.309514 kernel: audit: type=1334 audit(1707775370.845:89): prog-id=3 op=UNLOAD Feb 12 22:02:51.309536 kernel: audit: type=1334 audit(1707775370.846:90): prog-id=13 op=LOAD Feb 12 22:02:51.309560 kernel: audit: type=1334 audit(1707775370.848:91): prog-id=14 op=LOAD Feb 12 22:02:51.309582 kernel: audit: type=1334 audit(1707775370.848:92): prog-id=4 op=UNLOAD Feb 12 22:02:51.309603 kernel: audit: type=1334 audit(1707775370.848:93): prog-id=5 op=UNLOAD Feb 12 22:02:51.309623 kernel: audit: type=1334 audit(1707775370.850:94): prog-id=15 op=LOAD Feb 12 22:02:51.309640 kernel: audit: type=1334 audit(1707775370.850:95): prog-id=12 op=UNLOAD Feb 12 22:02:51.309745 kernel: audit: type=1334 audit(1707775370.854:96): prog-id=16 op=LOAD Feb 12 22:02:51.309769 kernel: audit: type=1334 audit(1707775370.859:97): prog-id=17 op=LOAD Feb 12 22:02:51.309792 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 22:02:51.309818 systemd[1]: Stopped initrd-switch-root.service. Feb 12 22:02:51.310069 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 22:02:51.310099 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 22:02:51.310121 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 22:02:51.310144 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 22:02:51.310164 systemd[1]: Created slice system-getty.slice. Feb 12 22:02:51.310182 systemd[1]: Created slice system-modprobe.slice. Feb 12 22:02:51.310200 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 22:02:51.310225 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 22:02:51.310245 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 22:02:51.310264 systemd[1]: Created slice user.slice. Feb 12 22:02:51.310283 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:02:51.310303 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 22:02:51.310322 systemd[1]: Set up automount boot.automount. Feb 12 22:02:51.310341 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 22:02:51.310360 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 22:02:51.310379 systemd[1]: Stopped target initrd-fs.target. Feb 12 22:02:51.310403 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 22:02:51.310423 systemd[1]: Reached target integritysetup.target. Feb 12 22:02:51.310443 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:02:51.310462 systemd[1]: Reached target remote-fs.target. Feb 12 22:02:51.310482 systemd[1]: Reached target slices.target. Feb 12 22:02:51.310501 systemd[1]: Reached target swap.target. Feb 12 22:02:51.310521 systemd[1]: Reached target torcx.target. Feb 12 22:02:51.310546 systemd[1]: Reached target veritysetup.target. Feb 12 22:02:51.310566 systemd[1]: Listening on systemd-coredump.socket. Feb 12 22:02:51.310586 systemd[1]: Listening on systemd-initctl.socket. Feb 12 22:02:51.310609 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:02:51.310631 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:02:51.310672 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:02:51.310694 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 22:02:51.310717 systemd[1]: Mounting dev-hugepages.mount... Feb 12 22:02:51.310739 systemd[1]: Mounting dev-mqueue.mount... Feb 12 22:02:51.310762 systemd[1]: Mounting media.mount... Feb 12 22:02:51.310785 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:02:51.310808 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 22:02:51.310833 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 22:02:51.310854 systemd[1]: Mounting tmp.mount... Feb 12 22:02:51.310887 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 22:02:51.310911 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 22:02:51.310932 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:02:51.310956 systemd[1]: Starting modprobe@configfs.service... Feb 12 22:02:51.310978 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 22:02:51.310997 systemd[1]: Starting modprobe@drm.service... Feb 12 22:02:51.311014 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 22:02:51.311032 systemd[1]: Starting modprobe@fuse.service... Feb 12 22:02:51.311051 systemd[1]: Starting modprobe@loop.service... Feb 12 22:02:51.311072 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 22:02:51.311093 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 22:02:51.311112 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 22:02:51.311136 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 22:02:51.311155 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 22:02:51.311172 systemd[1]: Stopped systemd-journald.service. Feb 12 22:02:51.311189 systemd[1]: Starting systemd-journald.service... Feb 12 22:02:51.311209 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:02:51.311228 systemd[1]: Starting systemd-network-generator.service... Feb 12 22:02:51.311247 systemd[1]: Starting systemd-remount-fs.service... Feb 12 22:02:51.311267 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:02:51.311285 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 22:02:51.311307 systemd[1]: Stopped verity-setup.service. Feb 12 22:02:51.311328 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:02:51.311347 systemd[1]: Mounted dev-hugepages.mount. Feb 12 22:02:51.311379 systemd[1]: Mounted dev-mqueue.mount. Feb 12 22:02:51.311396 systemd[1]: Mounted media.mount. Feb 12 22:02:51.311414 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 22:02:51.312299 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 22:02:51.312338 systemd[1]: Mounted tmp.mount. Feb 12 22:02:51.312362 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:02:51.312392 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 22:02:51.312417 systemd[1]: Finished modprobe@configfs.service. Feb 12 22:02:51.320013 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 22:02:51.320053 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 22:02:51.320080 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 22:02:51.320111 systemd[1]: Finished modprobe@drm.service. Feb 12 22:02:51.320135 kernel: loop: module loaded Feb 12 22:02:51.320158 kernel: fuse: init (API version 7.34) Feb 12 22:02:51.320181 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 22:02:51.320205 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 22:02:51.320230 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 22:02:51.320253 systemd[1]: Finished modprobe@fuse.service. Feb 12 22:02:51.320277 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 22:02:51.320300 systemd[1]: Finished modprobe@loop.service. Feb 12 22:02:51.320328 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:02:51.320352 systemd[1]: Finished systemd-network-generator.service. Feb 12 22:02:51.320376 systemd[1]: Finished systemd-remount-fs.service. Feb 12 22:02:51.320399 systemd[1]: Reached target network-pre.target. Feb 12 22:02:51.320423 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 22:02:51.320451 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 22:02:51.320476 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 22:02:51.320500 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 22:02:51.320523 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 22:02:51.320673 systemd-journald[1405]: Journal started Feb 12 22:02:51.320758 systemd-journald[1405]: Runtime Journal (/run/log/journal/ec28dd04e26a507ad90e6aecb9927e1d) is 4.8M, max 38.7M, 33.9M free. Feb 12 22:02:47.281000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 22:02:47.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:02:47.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:02:47.416000 audit: BPF prog-id=10 op=LOAD Feb 12 22:02:47.416000 audit: BPF prog-id=10 op=UNLOAD Feb 12 22:02:47.416000 audit: BPF prog-id=11 op=LOAD Feb 12 22:02:47.416000 audit: BPF prog-id=11 op=UNLOAD Feb 12 22:02:47.548000 audit[1327]: AVC avc: denied { associate } for pid=1327 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 22:02:47.548000 audit[1327]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8ac a1=c0000cede0 a2=c0000d7ac0 a3=32 items=0 ppid=1310 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:02:47.548000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:02:47.551000 audit[1327]: AVC avc: denied { associate } for pid=1327 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 22:02:47.551000 audit[1327]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d985 a2=1ed a3=0 items=2 ppid=1310 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:02:47.551000 audit: CWD cwd="/" Feb 12 22:02:47.551000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:47.551000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:47.551000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:02:50.845000 audit: BPF prog-id=12 op=LOAD Feb 12 22:02:50.845000 audit: BPF prog-id=3 op=UNLOAD Feb 12 22:02:50.846000 audit: BPF prog-id=13 op=LOAD Feb 12 22:02:50.848000 audit: BPF prog-id=14 op=LOAD Feb 12 22:02:50.848000 audit: BPF prog-id=4 op=UNLOAD Feb 12 22:02:50.848000 audit: BPF prog-id=5 op=UNLOAD Feb 12 22:02:50.850000 audit: BPF prog-id=15 op=LOAD Feb 12 22:02:50.850000 audit: BPF prog-id=12 op=UNLOAD Feb 12 22:02:50.854000 audit: BPF prog-id=16 op=LOAD Feb 12 22:02:50.859000 audit: BPF prog-id=17 op=LOAD Feb 12 22:02:50.859000 audit: BPF prog-id=13 op=UNLOAD Feb 12 22:02:50.859000 audit: BPF prog-id=14 op=UNLOAD Feb 12 22:02:50.861000 audit: BPF prog-id=18 op=LOAD Feb 12 22:02:50.861000 audit: BPF prog-id=15 op=UNLOAD Feb 12 22:02:50.863000 audit: BPF prog-id=19 op=LOAD Feb 12 22:02:50.865000 audit: BPF prog-id=20 op=LOAD Feb 12 22:02:51.331543 systemd[1]: Starting systemd-random-seed.service... Feb 12 22:02:51.331592 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 22:02:50.865000 audit: BPF prog-id=16 op=UNLOAD Feb 12 22:02:50.865000 audit: BPF prog-id=17 op=UNLOAD Feb 12 22:02:50.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.870000 audit: BPF prog-id=18 op=UNLOAD Feb 12 22:02:50.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.337983 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:02:50.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.344513 systemd[1]: Started systemd-journald.service. Feb 12 22:02:51.120000 audit: BPF prog-id=21 op=LOAD Feb 12 22:02:51.120000 audit: BPF prog-id=22 op=LOAD Feb 12 22:02:51.120000 audit: BPF prog-id=23 op=LOAD Feb 12 22:02:51.120000 audit: BPF prog-id=19 op=UNLOAD Feb 12 22:02:51.120000 audit: BPF prog-id=20 op=UNLOAD Feb 12 22:02:51.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.281000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 22:02:51.281000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd3585b790 a2=4000 a3=7ffd3585b82c items=0 ppid=1 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:02:51.281000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 22:02:51.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.844135 systemd[1]: Queued start job for default target multi-user.target. Feb 12 22:02:47.543907 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:02:50.866433 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 22:02:47.544991 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:02:51.343638 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 22:02:47.545020 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:02:51.345185 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 22:02:47.545068 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 22:02:51.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.347120 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 22:02:47.545086 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 22:02:51.348682 systemd[1]: Finished systemd-random-seed.service. Feb 12 22:02:47.545137 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 22:02:51.350226 systemd[1]: Reached target first-boot-complete.target. Feb 12 22:02:47.545157 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 22:02:51.353534 systemd[1]: Starting systemd-journal-flush.service... Feb 12 22:02:47.545789 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 22:02:47.545848 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:02:47.545867 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:02:47.546640 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 22:02:51.356693 systemd[1]: Starting systemd-sysusers.service... Feb 12 22:02:47.546716 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 22:02:47.546747 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 22:02:47.546771 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 22:02:47.546797 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 22:02:47.546819 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 22:02:50.321551 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:02:50.322059 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:02:51.374401 systemd-journald[1405]: Time spent on flushing to /var/log/journal/ec28dd04e26a507ad90e6aecb9927e1d is 95.502ms for 1210 entries. Feb 12 22:02:51.374401 systemd-journald[1405]: System Journal (/var/log/journal/ec28dd04e26a507ad90e6aecb9927e1d) is 8.0M, max 195.6M, 187.6M free. Feb 12 22:02:51.491351 systemd-journald[1405]: Received client request to flush runtime journal. Feb 12 22:02:51.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.322178 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:02:51.380803 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:02:50.322359 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:02:51.398933 systemd[1]: Finished systemd-sysusers.service. Feb 12 22:02:50.322410 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 22:02:51.402082 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:02:50.322468 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-12T22:02:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 22:02:51.433872 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:02:51.437151 systemd[1]: Starting systemd-udev-settle.service... Feb 12 22:02:51.493439 systemd[1]: Finished systemd-journal-flush.service. Feb 12 22:02:51.493753 udevadm[1445]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 22:02:51.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.496705 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:02:51.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.214603 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 22:02:52.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.216000 audit: BPF prog-id=24 op=LOAD Feb 12 22:02:52.216000 audit: BPF prog-id=25 op=LOAD Feb 12 22:02:52.216000 audit: BPF prog-id=7 op=UNLOAD Feb 12 22:02:52.216000 audit: BPF prog-id=8 op=UNLOAD Feb 12 22:02:52.218012 systemd[1]: Starting systemd-udevd.service... Feb 12 22:02:52.242789 systemd-udevd[1447]: Using default interface naming scheme 'v252'. Feb 12 22:02:52.278215 systemd[1]: Started systemd-udevd.service. Feb 12 22:02:52.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.280000 audit: BPF prog-id=26 op=LOAD Feb 12 22:02:52.282100 systemd[1]: Starting systemd-networkd.service... Feb 12 22:02:52.293000 audit: BPF prog-id=27 op=LOAD Feb 12 22:02:52.294000 audit: BPF prog-id=28 op=LOAD Feb 12 22:02:52.294000 audit: BPF prog-id=29 op=LOAD Feb 12 22:02:52.295792 systemd[1]: Starting systemd-userdbd.service... Feb 12 22:02:52.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.356764 systemd[1]: Started systemd-userdbd.service. Feb 12 22:02:52.368568 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 22:02:52.417857 (udev-worker)[1450]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:02:52.475027 systemd-networkd[1457]: lo: Link UP Feb 12 22:02:52.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.475038 systemd-networkd[1457]: lo: Gained carrier Feb 12 22:02:52.475596 systemd-networkd[1457]: Enumeration completed Feb 12 22:02:52.475735 systemd[1]: Started systemd-networkd.service. Feb 12 22:02:52.477863 systemd-networkd[1457]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:02:52.478858 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 22:02:52.489814 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 22:02:52.491589 systemd-networkd[1457]: eth0: Link UP Feb 12 22:02:52.494394 systemd-networkd[1457]: eth0: Gained carrier Feb 12 22:02:52.494661 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:02:52.504838 systemd-networkd[1457]: eth0: DHCPv4 address 172.31.19.213/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 22:02:52.516697 kernel: ACPI: button: Power Button [PWRF] Feb 12 22:02:52.522717 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 12 22:02:52.524674 kernel: ACPI: button: Sleep Button [SLPF] Feb 12 22:02:52.469000 audit[1460]: AVC avc: denied { confidentiality } for pid=1460 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 22:02:52.469000 audit[1460]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5627addf6820 a1=32194 a2=7f6d7974bbc5 a3=5 items=108 ppid=1447 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:02:52.469000 audit: CWD cwd="/" Feb 12 22:02:52.469000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=1 name=(null) inode=14221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=2 name=(null) inode=14221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=3 name=(null) inode=14222 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=4 name=(null) inode=14221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=5 name=(null) inode=14223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=6 name=(null) inode=14221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=7 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=8 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=9 name=(null) inode=14225 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=10 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=11 name=(null) inode=14226 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=12 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=13 name=(null) inode=14227 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=14 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.549711 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Feb 12 22:02:52.569703 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 22:02:52.469000 audit: PATH item=15 name=(null) inode=14228 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=16 name=(null) inode=14224 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=17 name=(null) inode=14229 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=18 name=(null) inode=14221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=19 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=20 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=21 name=(null) inode=14231 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=22 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=23 name=(null) inode=14232 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=24 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=25 name=(null) inode=14233 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=26 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=27 name=(null) inode=14234 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=28 name=(null) inode=14230 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=29 name=(null) inode=14235 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=30 name=(null) inode=14221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=31 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=32 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=33 name=(null) inode=14237 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=34 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=35 name=(null) inode=14238 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=36 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=37 name=(null) inode=14239 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=38 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=39 name=(null) inode=14240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=40 name=(null) inode=14236 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=41 name=(null) inode=14241 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=42 name=(null) inode=14221 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=43 name=(null) inode=14242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=44 name=(null) inode=14242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=45 name=(null) inode=14243 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=46 name=(null) inode=14242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=47 name=(null) inode=14244 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=48 name=(null) inode=14242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=49 name=(null) inode=14245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=50 name=(null) inode=14242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=51 name=(null) inode=14246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=52 name=(null) inode=14242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=53 name=(null) inode=14247 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=55 name=(null) inode=14248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=56 name=(null) inode=14248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=57 name=(null) inode=14249 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=58 name=(null) inode=14248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=59 name=(null) inode=14250 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=60 name=(null) inode=14248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=61 name=(null) inode=14251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=62 name=(null) inode=14251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=63 name=(null) inode=14252 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=64 name=(null) inode=14251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=65 name=(null) inode=14253 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=66 name=(null) inode=14251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=67 name=(null) inode=14254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=68 name=(null) inode=14251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=69 name=(null) inode=14255 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=70 name=(null) inode=14251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=71 name=(null) inode=14256 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=72 name=(null) inode=14248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=73 name=(null) inode=14257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=74 name=(null) inode=14257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=75 name=(null) inode=14258 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=76 name=(null) inode=14257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=77 name=(null) inode=14259 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=78 name=(null) inode=14257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=79 name=(null) inode=14260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=80 name=(null) inode=14257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=81 name=(null) inode=14261 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=82 name=(null) inode=14257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=83 name=(null) inode=14262 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=84 name=(null) inode=14248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=85 name=(null) inode=14263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=86 name=(null) inode=14263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=87 name=(null) inode=14264 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=88 name=(null) inode=14263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=89 name=(null) inode=14265 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=90 name=(null) inode=14263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=91 name=(null) inode=14266 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=92 name=(null) inode=14263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=93 name=(null) inode=14267 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=94 name=(null) inode=14263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=95 name=(null) inode=14268 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=96 name=(null) inode=14248 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=97 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=98 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=99 name=(null) inode=14270 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=100 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=101 name=(null) inode=14271 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=102 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=103 name=(null) inode=14272 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=104 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=105 name=(null) inode=14273 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=106 name=(null) inode=14269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PATH item=107 name=(null) inode=14274 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.469000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 22:02:52.602688 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Feb 12 22:02:52.614673 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1456) Feb 12 22:02:52.756359 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:02:52.866103 systemd[1]: Finished systemd-udev-settle.service. Feb 12 22:02:52.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.869225 systemd[1]: Starting lvm2-activation-early.service... Feb 12 22:02:52.908248 lvm[1561]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:02:52.940438 systemd[1]: Finished lvm2-activation-early.service. Feb 12 22:02:52.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.942283 systemd[1]: Reached target cryptsetup.target. Feb 12 22:02:52.945053 systemd[1]: Starting lvm2-activation.service... Feb 12 22:02:52.951703 lvm[1562]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:02:52.978209 systemd[1]: Finished lvm2-activation.service. Feb 12 22:02:52.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.979641 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:02:52.980933 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 22:02:52.980976 systemd[1]: Reached target local-fs.target. Feb 12 22:02:52.982167 systemd[1]: Reached target machines.target. Feb 12 22:02:52.984714 systemd[1]: Starting ldconfig.service... Feb 12 22:02:52.987384 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 22:02:52.987443 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:02:52.988713 systemd[1]: Starting systemd-boot-update.service... Feb 12 22:02:52.991004 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 22:02:52.999782 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 22:02:53.001709 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:02:53.001802 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:02:53.003764 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 22:02:53.009439 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1564 (bootctl) Feb 12 22:02:53.011543 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 22:02:53.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.045002 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 22:02:53.046122 systemd-tmpfiles[1567]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 22:02:53.047939 systemd-tmpfiles[1567]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 22:02:53.050864 systemd-tmpfiles[1567]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 22:02:53.199948 systemd-fsck[1572]: fsck.fat 4.2 (2021-01-31) Feb 12 22:02:53.199948 systemd-fsck[1572]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters Feb 12 22:02:53.203278 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 22:02:53.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.212919 systemd[1]: Mounting boot.mount... Feb 12 22:02:53.237323 systemd[1]: Mounted boot.mount. Feb 12 22:02:53.283831 systemd[1]: Finished systemd-boot-update.service. Feb 12 22:02:53.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.362856 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 22:02:53.369949 systemd[1]: Starting audit-rules.service... Feb 12 22:02:53.372939 systemd[1]: Starting clean-ca-certificates.service... Feb 12 22:02:53.378000 audit: BPF prog-id=30 op=LOAD Feb 12 22:02:53.376238 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 22:02:53.380584 systemd[1]: Starting systemd-resolved.service... Feb 12 22:02:53.385000 audit: BPF prog-id=31 op=LOAD Feb 12 22:02:53.387225 systemd[1]: Starting systemd-timesyncd.service... Feb 12 22:02:53.390334 systemd[1]: Starting systemd-update-utmp.service... Feb 12 22:02:53.399948 systemd[1]: Finished clean-ca-certificates.service. Feb 12 22:02:53.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.401970 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 22:02:53.414000 audit[1592]: SYSTEM_BOOT pid=1592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.422916 systemd[1]: Finished systemd-update-utmp.service. Feb 12 22:02:53.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.502118 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 22:02:53.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.508491 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 22:02:53.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.512345 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 22:02:53.555000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 22:02:53.555000 audit[1607]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcc5007190 a2=420 a3=0 items=0 ppid=1586 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:02:53.555000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 22:02:53.556390 augenrules[1607]: No rules Feb 12 22:02:53.556853 systemd[1]: Finished audit-rules.service. Feb 12 22:02:53.582582 systemd[1]: Started systemd-timesyncd.service. Feb 12 22:02:53.584870 systemd[1]: Reached target time-set.target. Feb 12 22:02:53.595192 systemd-resolved[1589]: Positive Trust Anchors: Feb 12 22:02:53.595207 systemd-resolved[1589]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:02:53.595260 systemd-resolved[1589]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:02:53.629390 systemd-resolved[1589]: Defaulting to hostname 'linux'. Feb 12 22:02:53.632051 systemd[1]: Started systemd-resolved.service. Feb 12 22:02:53.633831 systemd[1]: Reached target network.target. Feb 12 22:02:53.635235 systemd[1]: Reached target nss-lookup.target. Feb 12 22:02:53.711880 ldconfig[1563]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 22:02:53.719534 systemd[1]: Finished ldconfig.service. Feb 12 22:02:53.722082 systemd[1]: Starting systemd-update-done.service... Feb 12 22:02:53.730621 systemd[1]: Finished systemd-update-done.service. Feb 12 22:02:53.732115 systemd[1]: Reached target sysinit.target. Feb 12 22:02:53.733401 systemd[1]: Started motdgen.path. Feb 12 22:02:53.734469 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 22:02:53.736243 systemd[1]: Started logrotate.timer. Feb 12 22:02:53.737438 systemd[1]: Started mdadm.timer. Feb 12 22:02:53.738455 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 22:02:53.739628 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 22:02:53.739693 systemd[1]: Reached target paths.target. Feb 12 22:02:53.740770 systemd[1]: Reached target timers.target. Feb 12 22:02:53.742201 systemd[1]: Listening on dbus.socket. Feb 12 22:02:53.744753 systemd[1]: Starting docker.socket... Feb 12 22:02:53.749747 systemd[1]: Listening on sshd.socket. Feb 12 22:02:53.751168 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:02:53.751715 systemd[1]: Listening on docker.socket. Feb 12 22:02:53.759520 systemd[1]: Reached target sockets.target. Feb 12 22:02:53.760746 systemd[1]: Reached target basic.target. Feb 12 22:02:53.761922 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:02:53.761947 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:02:53.763130 systemd[1]: Starting containerd.service... Feb 12 22:02:53.765410 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 22:02:53.768309 systemd[1]: Starting dbus.service... Feb 12 22:02:53.770529 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 22:02:53.773884 systemd[1]: Starting extend-filesystems.service... Feb 12 22:02:53.775360 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 22:02:53.776409 systemd[1]: Starting motdgen.service... Feb 12 22:02:53.779410 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 22:02:53.781513 systemd[1]: Starting prepare-critools.service... Feb 12 22:02:53.783902 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 22:02:53.786459 systemd[1]: Starting sshd-keygen.service... Feb 12 22:02:53.790166 systemd[1]: Starting systemd-logind.service... Feb 12 22:02:53.792445 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:02:53.792501 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 22:02:53.793149 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 22:02:53.794155 systemd[1]: Starting update-engine.service... Feb 12 22:02:53.797200 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 22:02:53.833834 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 22:02:53.835180 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 22:02:53.842170 tar[1632]: ./ Feb 12 22:02:53.842170 tar[1632]: ./loopback Feb 12 22:02:53.862096 jq[1619]: false Feb 12 22:02:53.865908 jq[1630]: true Feb 12 22:02:53.879768 tar[1635]: crictl Feb 12 22:02:53.876012 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 22:02:53.876224 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 22:02:53.926075 jq[1648]: true Feb 12 22:02:53.930699 extend-filesystems[1620]: Found nvme0n1 Feb 12 22:02:53.930699 extend-filesystems[1620]: Found nvme0n1p1 Feb 12 22:02:53.930699 extend-filesystems[1620]: Found nvme0n1p2 Feb 12 22:02:53.930699 extend-filesystems[1620]: Found nvme0n1p3 Feb 12 22:02:53.930699 extend-filesystems[1620]: Found usr Feb 12 22:02:53.930699 extend-filesystems[1620]: Found nvme0n1p4 Feb 12 22:02:53.930699 extend-filesystems[1620]: Found nvme0n1p6 Feb 12 22:02:53.930699 extend-filesystems[1620]: Found nvme0n1p7 Feb 12 22:02:53.930699 extend-filesystems[1620]: Found nvme0n1p9 Feb 12 22:02:53.930699 extend-filesystems[1620]: Checking size of /dev/nvme0n1p9 Feb 12 22:02:53.946493 dbus-daemon[1618]: [system] SELinux support is enabled Feb 12 22:02:53.946713 systemd[1]: Started dbus.service. Feb 12 22:02:53.951849 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 22:02:53.951891 systemd[1]: Reached target system-config.target. Feb 12 22:02:53.953333 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 22:02:53.953383 systemd[1]: Reached target user-config.target. Feb 12 22:02:53.964386 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 22:02:53.964599 systemd[1]: Finished motdgen.service. Feb 12 22:02:53.985157 extend-filesystems[1620]: Resized partition /dev/nvme0n1p9 Feb 12 22:02:54.007939 extend-filesystems[1664]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 22:02:54.008117 dbus-daemon[1618]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1457 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 12 22:02:54.012290 dbus-daemon[1618]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 22:02:54.020671 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 12 22:02:54.021115 systemd[1]: Starting systemd-hostnamed.service... Feb 12 22:02:54.042855 bash[1674]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:02:54.043948 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 22:02:54.090865 update_engine[1629]: I0212 22:02:54.089362 1629 main.cc:92] Flatcar Update Engine starting Feb 12 22:02:54.097012 systemd[1]: Started update-engine.service. Feb 12 22:02:54.101153 systemd[1]: Started locksmithd.service. Feb 12 22:02:54.103612 update_engine[1629]: I0212 22:02:54.103260 1629 update_check_scheduler.cc:74] Next update check in 7m6s Feb 12 22:02:54.145187 env[1633]: time="2024-02-12T22:02:54.145128568Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 22:02:54.190716 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 12 22:02:54.222409 tar[1632]: ./bandwidth Feb 12 22:02:54.224541 extend-filesystems[1664]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 12 22:02:54.224541 extend-filesystems[1664]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 22:02:54.224541 extend-filesystems[1664]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 12 22:02:54.234993 extend-filesystems[1620]: Resized filesystem in /dev/nvme0n1p9 Feb 12 22:02:54.228032 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 22:02:54.228268 systemd[1]: Finished extend-filesystems.service. Feb 12 22:02:54.302181 systemd-logind[1628]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 22:02:54.317872 systemd-logind[1628]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 12 22:02:54.318105 systemd-logind[1628]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 22:02:54.319816 systemd-logind[1628]: New seat seat0. Feb 12 22:02:54.326484 systemd[1]: Started systemd-logind.service. Feb 12 22:02:54.457531 env[1633]: time="2024-02-12T22:02:54.457433339Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 22:02:54.457691 env[1633]: time="2024-02-12T22:02:54.457670463Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.478661 env[1633]: time="2024-02-12T22:02:54.478594406Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:02:54.482027 tar[1632]: ./ptp Feb 12 22:02:54.482207 env[1633]: time="2024-02-12T22:02:54.482175896Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.482613 env[1633]: time="2024-02-12T22:02:54.482584688Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:02:54.482748 env[1633]: time="2024-02-12T22:02:54.482730504Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.482824 env[1633]: time="2024-02-12T22:02:54.482809679Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 22:02:54.482881 env[1633]: time="2024-02-12T22:02:54.482869676Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.483037 env[1633]: time="2024-02-12T22:02:54.483020288Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.483382 env[1633]: time="2024-02-12T22:02:54.483360784Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.484955 env[1633]: time="2024-02-12T22:02:54.484918264Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:02:54.488730 env[1633]: time="2024-02-12T22:02:54.488691265Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 22:02:54.488968 env[1633]: time="2024-02-12T22:02:54.488943120Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 22:02:54.489059 env[1633]: time="2024-02-12T22:02:54.489043523Z" level=info msg="metadata content store policy set" policy=shared Feb 12 22:02:54.503743 env[1633]: time="2024-02-12T22:02:54.503705268Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 22:02:54.503944 env[1633]: time="2024-02-12T22:02:54.503925974Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 22:02:54.504029 env[1633]: time="2024-02-12T22:02:54.504012505Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 22:02:54.504158 env[1633]: time="2024-02-12T22:02:54.504140752Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.504312 env[1633]: time="2024-02-12T22:02:54.504293869Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.504392 env[1633]: time="2024-02-12T22:02:54.504377735Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.504462 env[1633]: time="2024-02-12T22:02:54.504449116Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.504540 env[1633]: time="2024-02-12T22:02:54.504526628Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.504606 env[1633]: time="2024-02-12T22:02:54.504594859Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.504693 env[1633]: time="2024-02-12T22:02:54.504678578Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.504768 env[1633]: time="2024-02-12T22:02:54.504752524Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.504840 env[1633]: time="2024-02-12T22:02:54.504827341Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 22:02:54.505031 env[1633]: time="2024-02-12T22:02:54.505014158Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 22:02:54.507854 env[1633]: time="2024-02-12T22:02:54.505329091Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 22:02:54.508744 env[1633]: time="2024-02-12T22:02:54.508711209Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.508988 env[1633]: time="2024-02-12T22:02:54.508965981Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.509088 env[1633]: time="2024-02-12T22:02:54.509070822Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 22:02:54.511122 env[1633]: time="2024-02-12T22:02:54.511094694Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.511352 env[1633]: time="2024-02-12T22:02:54.511328866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.511515 env[1633]: time="2024-02-12T22:02:54.511496052Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.511612 env[1633]: time="2024-02-12T22:02:54.511596579Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.511711 env[1633]: time="2024-02-12T22:02:54.511695964Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.511775 env[1633]: time="2024-02-12T22:02:54.511763814Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.511841 env[1633]: time="2024-02-12T22:02:54.511827310Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.512014 env[1633]: time="2024-02-12T22:02:54.511996939Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.512115 env[1633]: time="2024-02-12T22:02:54.512101059Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 22:02:54.512353 env[1633]: time="2024-02-12T22:02:54.512335411Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.512525 env[1633]: time="2024-02-12T22:02:54.512501467Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.512700 env[1633]: time="2024-02-12T22:02:54.512683594Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.513813 systemd-networkd[1457]: eth0: Gained IPv6LL Feb 12 22:02:54.514556 systemd-timesyncd[1591]: Network configuration changed, trying to establish connection. Feb 12 22:02:54.516090 env[1633]: time="2024-02-12T22:02:54.516064247Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 22:02:54.516194 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 22:02:54.519503 systemd[1]: Reached target network-online.target. Feb 12 22:02:54.532459 env[1633]: time="2024-02-12T22:02:54.517694375Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 22:02:54.532459 env[1633]: time="2024-02-12T22:02:54.517726934Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 22:02:54.532459 env[1633]: time="2024-02-12T22:02:54.517768047Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 22:02:54.532459 env[1633]: time="2024-02-12T22:02:54.517833965Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.524214 systemd[1]: Started amazon-ssm-agent.service. Feb 12 22:02:54.528046 systemd[1]: Started nvidia.service. Feb 12 22:02:54.533834 env[1633]: time="2024-02-12T22:02:54.518138297Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 22:02:54.533834 env[1633]: time="2024-02-12T22:02:54.518221997Z" level=info msg="Connect containerd service" Feb 12 22:02:54.533834 env[1633]: time="2024-02-12T22:02:54.518271756Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 22:02:54.533834 env[1633]: time="2024-02-12T22:02:54.526385350Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:02:54.533834 env[1633]: time="2024-02-12T22:02:54.526897873Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 22:02:54.533834 env[1633]: time="2024-02-12T22:02:54.526957747Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 22:02:54.533834 env[1633]: time="2024-02-12T22:02:54.527010472Z" level=info msg="containerd successfully booted in 0.383162s" Feb 12 22:02:54.530073 systemd[1]: Started containerd.service. Feb 12 22:02:54.555179 env[1633]: time="2024-02-12T22:02:54.543764831Z" level=info msg="Start subscribing containerd event" Feb 12 22:02:54.555179 env[1633]: time="2024-02-12T22:02:54.543972844Z" level=info msg="Start recovering state" Feb 12 22:02:54.555179 env[1633]: time="2024-02-12T22:02:54.544071218Z" level=info msg="Start event monitor" Feb 12 22:02:54.555179 env[1633]: time="2024-02-12T22:02:54.544097559Z" level=info msg="Start snapshots syncer" Feb 12 22:02:54.555179 env[1633]: time="2024-02-12T22:02:54.544116625Z" level=info msg="Start cni network conf syncer for default" Feb 12 22:02:54.555179 env[1633]: time="2024-02-12T22:02:54.544130129Z" level=info msg="Start streaming server" Feb 12 22:02:54.569689 dbus-daemon[1618]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 12 22:02:54.591081 systemd[1]: Started systemd-hostnamed.service. Feb 12 22:02:54.643241 dbus-daemon[1618]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1675 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 12 22:02:54.647268 systemd[1]: Starting polkit.service... Feb 12 22:02:54.700616 polkitd[1785]: Started polkitd version 121 Feb 12 22:02:54.763281 polkitd[1785]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 22:02:54.787465 polkitd[1785]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 22:02:54.800565 polkitd[1785]: Finished loading, compiling and executing 2 rules Feb 12 22:02:54.801333 dbus-daemon[1618]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 22:02:54.801688 systemd[1]: Started polkit.service. Feb 12 22:02:54.805622 polkitd[1785]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 22:02:54.837670 tar[1632]: ./vlan Feb 12 22:02:54.845927 amazon-ssm-agent[1773]: 2024/02/12 22:02:54 Failed to load instance info from vault. RegistrationKey does not exist. Feb 12 22:02:54.848203 amazon-ssm-agent[1773]: Initializing new seelog logger Feb 12 22:02:54.857989 amazon-ssm-agent[1773]: New Seelog Logger Creation Complete Feb 12 22:02:54.858263 amazon-ssm-agent[1773]: 2024/02/12 22:02:54 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 22:02:54.858372 amazon-ssm-agent[1773]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 22:02:54.859472 amazon-ssm-agent[1773]: 2024/02/12 22:02:54 processing appconfig overrides Feb 12 22:02:54.870542 systemd-hostnamed[1675]: Hostname set to (transient) Feb 12 22:02:54.875745 systemd-resolved[1589]: System hostname changed to 'ip-172-31-19-213'. Feb 12 22:02:54.969822 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 22:02:54.999505 coreos-metadata[1617]: Feb 12 22:02:54.993 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 12 22:02:55.000216 tar[1632]: ./host-device Feb 12 22:02:55.002792 coreos-metadata[1617]: Feb 12 22:02:55.002 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 12 22:02:55.003846 coreos-metadata[1617]: Feb 12 22:02:55.003 INFO Fetch successful Feb 12 22:02:55.003985 coreos-metadata[1617]: Feb 12 22:02:55.003 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 12 22:02:55.004967 coreos-metadata[1617]: Feb 12 22:02:55.004 INFO Fetch successful Feb 12 22:02:55.007508 unknown[1617]: wrote ssh authorized keys file for user: core Feb 12 22:02:55.039559 update-ssh-keys[1804]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:02:55.040541 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 22:02:55.143015 tar[1632]: ./tuning Feb 12 22:02:55.226886 tar[1632]: ./vrf Feb 12 22:02:55.329746 tar[1632]: ./sbr Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Create new startup processor Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [LongRunningPluginsManager] registered plugins: {} Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Initializing bookkeeping folders Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO removing the completed state files Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Initializing bookkeeping folders for long running plugins Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Initializing healthcheck folders for long running plugins Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Initializing locations for inventory plugin Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Initializing default location for custom inventory Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Initializing default location for file inventory Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Initializing default location for role inventory Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Init the cloudwatchlogs publisher Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Successfully loaded platform independent plugin aws:runDocument Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Successfully loaded platform independent plugin aws:softwareInventory Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Successfully loaded platform independent plugin aws:runDockerAction Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Successfully loaded platform independent plugin aws:configurePackage Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Successfully loaded platform independent plugin aws:downloadContent Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Successfully loaded platform independent plugin aws:configureDocker Feb 12 22:02:55.370705 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Successfully loaded platform independent plugin aws:refreshAssociation Feb 12 22:02:55.371593 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Successfully loaded platform dependent plugin aws:runShellScript Feb 12 22:02:55.371593 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 12 22:02:55.371593 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO OS: linux, Arch: amd64 Feb 12 22:02:55.372260 amazon-ssm-agent[1773]: datastore file /var/lib/amazon/ssm/i-0780a1a41ba65d216/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 12 22:02:55.437555 tar[1632]: ./tap Feb 12 22:02:55.464541 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] Starting document processing engine... Feb 12 22:02:55.552973 tar[1632]: ./dhcp Feb 12 22:02:55.559162 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 12 22:02:55.653500 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 12 22:02:55.748771 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] Starting message polling Feb 12 22:02:55.781425 systemd[1]: Finished prepare-critools.service. Feb 12 22:02:55.786338 tar[1632]: ./static Feb 12 22:02:55.820941 tar[1632]: ./firewall Feb 12 22:02:55.843277 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 12 22:02:55.877405 tar[1632]: ./macvlan Feb 12 22:02:55.930534 tar[1632]: ./dummy Feb 12 22:02:55.938279 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [instanceID=i-0780a1a41ba65d216] Starting association polling Feb 12 22:02:55.983059 tar[1632]: ./bridge Feb 12 22:02:56.033307 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 12 22:02:56.035122 tar[1632]: ./ipvlan Feb 12 22:02:56.089291 tar[1632]: ./portmap Feb 12 22:02:56.128582 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 12 22:02:56.137321 tar[1632]: ./host-local Feb 12 22:02:56.195596 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 22:02:56.208882 locksmithd[1682]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 22:02:56.224158 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 12 22:02:56.319871 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 12 22:02:56.385886 sshd_keygen[1653]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 22:02:56.413500 systemd[1]: Finished sshd-keygen.service. Feb 12 22:02:56.415780 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 12 22:02:56.416505 systemd[1]: Starting issuegen.service... Feb 12 22:02:56.422826 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 22:02:56.423024 systemd[1]: Finished issuegen.service. Feb 12 22:02:56.426623 systemd[1]: Starting systemd-user-sessions.service... Feb 12 22:02:56.435245 systemd[1]: Finished systemd-user-sessions.service. Feb 12 22:02:56.438699 systemd[1]: Started getty@tty1.service. Feb 12 22:02:56.441885 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 22:02:56.443431 systemd[1]: Reached target getty.target. Feb 12 22:02:56.445830 systemd[1]: Reached target multi-user.target. Feb 12 22:02:56.449304 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 22:02:56.460433 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 22:02:56.460658 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 22:02:56.462458 systemd[1]: Startup finished in 896ms (kernel) + 8.293s (initrd) + 9.273s (userspace) = 18.463s. Feb 12 22:02:56.511872 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessageGatewayService] Starting session document processing engine... Feb 12 22:02:56.608179 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 12 22:02:56.704715 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 12 22:02:56.801459 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0780a1a41ba65d216, requestId: b3ec497a-1890-47bd-a2fc-ec07eec87798 Feb 12 22:02:56.898376 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [OfflineService] Starting document processing engine... Feb 12 22:02:56.995512 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [OfflineService] [EngineProcessor] Starting Feb 12 22:02:57.092776 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [OfflineService] [EngineProcessor] Initial processing Feb 12 22:02:57.190275 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [OfflineService] Starting message polling Feb 12 22:02:57.288121 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [OfflineService] Starting send replies to MDS Feb 12 22:02:57.385984 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 12 22:02:57.487342 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 12 22:02:57.585733 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [HealthCheck] HealthCheck reporting agent health. Feb 12 22:02:57.684155 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessageGatewayService] listening reply. Feb 12 22:02:57.782877 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 12 22:02:57.882031 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [StartupProcessor] Executing startup processor tasks Feb 12 22:02:57.981122 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 12 22:02:58.080345 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 12 22:02:58.180011 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 12 22:02:58.279660 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0780a1a41ba65d216?role=subscribe&stream=input Feb 12 22:02:58.379510 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0780a1a41ba65d216?role=subscribe&stream=input Feb 12 22:02:58.479601 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessageGatewayService] Starting receiving message from control channel Feb 12 22:02:58.579794 amazon-ssm-agent[1773]: 2024-02-12 22:02:55 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 12 22:02:59.496034 amazon-ssm-agent[1773]: 2024-02-12 22:02:59 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 12 22:03:02.708136 systemd[1]: Created slice system-sshd.slice. Feb 12 22:03:02.710042 systemd[1]: Started sshd@0-172.31.19.213:22-139.178.89.65:60192.service. Feb 12 22:03:02.916319 sshd[1830]: Accepted publickey for core from 139.178.89.65 port 60192 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:02.920335 sshd[1830]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:02.937745 systemd[1]: Created slice user-500.slice. Feb 12 22:03:02.939903 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 22:03:02.944295 systemd-logind[1628]: New session 1 of user core. Feb 12 22:03:02.955209 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 22:03:02.957522 systemd[1]: Starting user@500.service... Feb 12 22:03:02.962817 (systemd)[1833]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:03.097608 systemd[1833]: Queued start job for default target default.target. Feb 12 22:03:03.098325 systemd[1833]: Reached target paths.target. Feb 12 22:03:03.098359 systemd[1833]: Reached target sockets.target. Feb 12 22:03:03.098377 systemd[1833]: Reached target timers.target. Feb 12 22:03:03.098394 systemd[1833]: Reached target basic.target. Feb 12 22:03:03.098515 systemd[1]: Started user@500.service. Feb 12 22:03:03.100105 systemd[1]: Started session-1.scope. Feb 12 22:03:03.100760 systemd[1833]: Reached target default.target. Feb 12 22:03:03.100977 systemd[1833]: Startup finished in 129ms. Feb 12 22:03:03.252823 systemd[1]: Started sshd@1-172.31.19.213:22-139.178.89.65:60194.service. Feb 12 22:03:03.431808 sshd[1842]: Accepted publickey for core from 139.178.89.65 port 60194 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:03.434136 sshd[1842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:03.456435 systemd-logind[1628]: New session 2 of user core. Feb 12 22:03:03.457377 systemd[1]: Started session-2.scope. Feb 12 22:03:03.637844 sshd[1842]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:03.644837 systemd[1]: sshd@1-172.31.19.213:22-139.178.89.65:60194.service: Deactivated successfully. Feb 12 22:03:03.648391 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 22:03:03.650286 systemd-logind[1628]: Session 2 logged out. Waiting for processes to exit. Feb 12 22:03:03.655043 systemd-logind[1628]: Removed session 2. Feb 12 22:03:03.669763 systemd[1]: Started sshd@2-172.31.19.213:22-139.178.89.65:60204.service. Feb 12 22:03:03.853495 sshd[1848]: Accepted publickey for core from 139.178.89.65 port 60204 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:03.855453 sshd[1848]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:03.861185 systemd-logind[1628]: New session 3 of user core. Feb 12 22:03:03.861799 systemd[1]: Started session-3.scope. Feb 12 22:03:03.981696 sshd[1848]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:03.985145 systemd[1]: sshd@2-172.31.19.213:22-139.178.89.65:60204.service: Deactivated successfully. Feb 12 22:03:03.986379 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 22:03:03.987167 systemd-logind[1628]: Session 3 logged out. Waiting for processes to exit. Feb 12 22:03:03.988300 systemd-logind[1628]: Removed session 3. Feb 12 22:03:04.008379 systemd[1]: Started sshd@3-172.31.19.213:22-139.178.89.65:60218.service. Feb 12 22:03:04.181566 sshd[1854]: Accepted publickey for core from 139.178.89.65 port 60218 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:04.183260 sshd[1854]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:04.192784 systemd[1]: Started session-4.scope. Feb 12 22:03:04.193978 systemd-logind[1628]: New session 4 of user core. Feb 12 22:03:04.322065 sshd[1854]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:04.326632 systemd[1]: sshd@3-172.31.19.213:22-139.178.89.65:60218.service: Deactivated successfully. Feb 12 22:03:04.327546 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 22:03:04.329492 systemd-logind[1628]: Session 4 logged out. Waiting for processes to exit. Feb 12 22:03:04.331512 systemd-logind[1628]: Removed session 4. Feb 12 22:03:04.349309 systemd[1]: Started sshd@4-172.31.19.213:22-139.178.89.65:60228.service. Feb 12 22:03:04.516981 sshd[1860]: Accepted publickey for core from 139.178.89.65 port 60228 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:04.518381 sshd[1860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:04.524949 systemd[1]: Started session-5.scope. Feb 12 22:03:04.525601 systemd-logind[1628]: New session 5 of user core. Feb 12 22:03:04.655219 sudo[1863]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 22:03:04.655525 sudo[1863]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:03:04.662882 dbus-daemon[1618]: \xd0m>,CV: received setenforce notice (enforcing=-1526426752) Feb 12 22:03:04.665041 sudo[1863]: pam_unix(sudo:session): session closed for user root Feb 12 22:03:04.690030 sshd[1860]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:04.694843 systemd[1]: sshd@4-172.31.19.213:22-139.178.89.65:60228.service: Deactivated successfully. Feb 12 22:03:04.695865 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 22:03:04.696619 systemd-logind[1628]: Session 5 logged out. Waiting for processes to exit. Feb 12 22:03:04.697675 systemd-logind[1628]: Removed session 5. Feb 12 22:03:04.715511 systemd[1]: Started sshd@5-172.31.19.213:22-139.178.89.65:60242.service. Feb 12 22:03:04.890126 sshd[1867]: Accepted publickey for core from 139.178.89.65 port 60242 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:04.891694 sshd[1867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:04.909535 systemd-logind[1628]: New session 6 of user core. Feb 12 22:03:04.912597 systemd[1]: Started session-6.scope. Feb 12 22:03:05.035756 sudo[1871]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 22:03:05.036220 sudo[1871]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:03:05.040016 sudo[1871]: pam_unix(sudo:session): session closed for user root Feb 12 22:03:05.046768 sudo[1870]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 22:03:05.047065 sudo[1870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:03:05.062851 systemd[1]: Stopping audit-rules.service... Feb 12 22:03:05.067000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:03:05.073573 kernel: kauditd_printk_skb: 190 callbacks suppressed Feb 12 22:03:05.073718 kernel: audit: type=1305 audit(1707775385.067:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:03:05.074104 auditctl[1874]: No rules Feb 12 22:03:05.074959 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 22:03:05.075202 systemd[1]: Stopped audit-rules.service. Feb 12 22:03:05.067000 audit[1874]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc56acd40 a2=420 a3=0 items=0 ppid=1 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:05.082848 systemd[1]: Starting audit-rules.service... Feb 12 22:03:05.091564 kernel: audit: type=1300 audit(1707775385.067:173): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc56acd40 a2=420 a3=0 items=0 ppid=1 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:05.067000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:03:05.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.101587 kernel: audit: type=1327 audit(1707775385.067:173): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:03:05.101701 kernel: audit: type=1131 audit(1707775385.072:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.114863 augenrules[1891]: No rules Feb 12 22:03:05.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.117490 sudo[1870]: pam_unix(sudo:session): session closed for user root Feb 12 22:03:05.115798 systemd[1]: Finished audit-rules.service. Feb 12 22:03:05.115000 audit[1870]: USER_END pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.132136 kernel: audit: type=1130 audit(1707775385.115:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.132301 kernel: audit: type=1106 audit(1707775385.115:176): pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.132338 kernel: audit: type=1104 audit(1707775385.115:177): pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.115000 audit[1870]: CRED_DISP pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.144256 sshd[1867]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:05.145000 audit[1867]: USER_END pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:05.148968 systemd-logind[1628]: Session 6 logged out. Waiting for processes to exit. Feb 12 22:03:05.151454 systemd[1]: sshd@5-172.31.19.213:22-139.178.89.65:60242.service: Deactivated successfully. Feb 12 22:03:05.152796 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 22:03:05.145000 audit[1867]: CRED_DISP pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:05.155189 systemd-logind[1628]: Removed session 6. Feb 12 22:03:05.162417 kernel: audit: type=1106 audit(1707775385.145:178): pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:05.162509 kernel: audit: type=1104 audit(1707775385.145:179): pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:05.162569 kernel: audit: type=1131 audit(1707775385.151:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.213:22-139.178.89.65:60242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.213:22-139.178.89.65:60242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.171093 systemd[1]: Started sshd@6-172.31.19.213:22-139.178.89.65:60246.service. Feb 12 22:03:05.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.213:22-139.178.89.65:60246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.337000 audit[1897]: USER_ACCT pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:05.338020 sshd[1897]: Accepted publickey for core from 139.178.89.65 port 60246 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:05.338000 audit[1897]: CRED_ACQ pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:05.338000 audit[1897]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7e72e250 a2=3 a3=0 items=0 ppid=1 pid=1897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:05.338000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:03:05.339609 sshd[1897]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:05.365558 systemd-logind[1628]: New session 7 of user core. Feb 12 22:03:05.366169 systemd[1]: Started session-7.scope. Feb 12 22:03:05.372000 audit[1897]: USER_START pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:05.373000 audit[1899]: CRED_ACQ pid=1899 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:05.464000 audit[1900]: USER_ACCT pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.465000 audit[1900]: CRED_REFR pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:05.465525 sudo[1900]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 22:03:05.465821 sudo[1900]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:03:05.467000 audit[1900]: USER_START pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.040377 systemd[1]: Reloading. Feb 12 22:03:06.173340 /usr/lib/systemd/system-generators/torcx-generator[1932]: time="2024-02-12T22:03:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:03:06.173382 /usr/lib/systemd/system-generators/torcx-generator[1932]: time="2024-02-12T22:03:06Z" level=info msg="torcx already run" Feb 12 22:03:06.296292 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:03:06.296376 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:03:06.323860 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit: BPF prog-id=40 op=LOAD Feb 12 22:03:06.415000 audit: BPF prog-id=35 op=UNLOAD Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit: BPF prog-id=41 op=LOAD Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.415000 audit: BPF prog-id=42 op=LOAD Feb 12 22:03:06.415000 audit: BPF prog-id=36 op=UNLOAD Feb 12 22:03:06.415000 audit: BPF prog-id=37 op=UNLOAD Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit: BPF prog-id=43 op=LOAD Feb 12 22:03:06.418000 audit: BPF prog-id=38 op=UNLOAD Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit: BPF prog-id=44 op=LOAD Feb 12 22:03:06.419000 audit: BPF prog-id=27 op=UNLOAD Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit: BPF prog-id=45 op=LOAD Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.419000 audit: BPF prog-id=46 op=LOAD Feb 12 22:03:06.419000 audit: BPF prog-id=28 op=UNLOAD Feb 12 22:03:06.419000 audit: BPF prog-id=29 op=UNLOAD Feb 12 22:03:06.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit: BPF prog-id=47 op=LOAD Feb 12 22:03:06.421000 audit: BPF prog-id=21 op=UNLOAD Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit: BPF prog-id=48 op=LOAD Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit: BPF prog-id=49 op=LOAD Feb 12 22:03:06.421000 audit: BPF prog-id=22 op=UNLOAD Feb 12 22:03:06.421000 audit: BPF prog-id=23 op=UNLOAD Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit: BPF prog-id=50 op=LOAD Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.421000 audit: BPF prog-id=51 op=LOAD Feb 12 22:03:06.421000 audit: BPF prog-id=24 op=UNLOAD Feb 12 22:03:06.421000 audit: BPF prog-id=25 op=UNLOAD Feb 12 22:03:06.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.424000 audit: BPF prog-id=52 op=LOAD Feb 12 22:03:06.424000 audit: BPF prog-id=31 op=UNLOAD Feb 12 22:03:06.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit: BPF prog-id=53 op=LOAD Feb 12 22:03:06.428000 audit: BPF prog-id=32 op=UNLOAD Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit: BPF prog-id=54 op=LOAD Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.428000 audit: BPF prog-id=55 op=LOAD Feb 12 22:03:06.428000 audit: BPF prog-id=33 op=UNLOAD Feb 12 22:03:06.428000 audit: BPF prog-id=34 op=UNLOAD Feb 12 22:03:06.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.430000 audit: BPF prog-id=56 op=LOAD Feb 12 22:03:06.430000 audit: BPF prog-id=30 op=UNLOAD Feb 12 22:03:06.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:06.431000 audit: BPF prog-id=57 op=LOAD Feb 12 22:03:06.431000 audit: BPF prog-id=26 op=UNLOAD Feb 12 22:03:06.451111 systemd[1]: Started kubelet.service. Feb 12 22:03:06.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.480365 systemd[1]: Starting coreos-metadata.service... Feb 12 22:03:06.613732 kubelet[1981]: E0212 22:03:06.606571 1981 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 22:03:06.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:03:06.627509 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:03:06.627705 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:03:06.653678 coreos-metadata[1989]: Feb 12 22:03:06.653 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 12 22:03:06.654699 coreos-metadata[1989]: Feb 12 22:03:06.654 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Feb 12 22:03:06.655586 coreos-metadata[1989]: Feb 12 22:03:06.655 INFO Fetch successful Feb 12 22:03:06.655586 coreos-metadata[1989]: Feb 12 22:03:06.655 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Feb 12 22:03:06.656445 coreos-metadata[1989]: Feb 12 22:03:06.656 INFO Fetch successful Feb 12 22:03:06.656445 coreos-metadata[1989]: Feb 12 22:03:06.656 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Feb 12 22:03:06.657299 coreos-metadata[1989]: Feb 12 22:03:06.657 INFO Fetch successful Feb 12 22:03:06.657299 coreos-metadata[1989]: Feb 12 22:03:06.657 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Feb 12 22:03:06.661835 coreos-metadata[1989]: Feb 12 22:03:06.661 INFO Fetch successful Feb 12 22:03:06.661835 coreos-metadata[1989]: Feb 12 22:03:06.661 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Feb 12 22:03:06.662474 coreos-metadata[1989]: Feb 12 22:03:06.662 INFO Fetch successful Feb 12 22:03:06.662543 coreos-metadata[1989]: Feb 12 22:03:06.662 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Feb 12 22:03:06.663004 coreos-metadata[1989]: Feb 12 22:03:06.662 INFO Fetch successful Feb 12 22:03:06.663067 coreos-metadata[1989]: Feb 12 22:03:06.663 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Feb 12 22:03:06.663462 coreos-metadata[1989]: Feb 12 22:03:06.663 INFO Fetch successful Feb 12 22:03:06.663530 coreos-metadata[1989]: Feb 12 22:03:06.663 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Feb 12 22:03:06.663986 coreos-metadata[1989]: Feb 12 22:03:06.663 INFO Fetch successful Feb 12 22:03:06.676683 systemd[1]: Finished coreos-metadata.service. Feb 12 22:03:06.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:07.204537 systemd[1]: Stopped kubelet.service. Feb 12 22:03:07.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:07.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:07.223245 systemd[1]: Reloading. Feb 12 22:03:07.317405 /usr/lib/systemd/system-generators/torcx-generator[2044]: time="2024-02-12T22:03:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:03:07.317446 /usr/lib/systemd/system-generators/torcx-generator[2044]: time="2024-02-12T22:03:07Z" level=info msg="torcx already run" Feb 12 22:03:07.455895 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:03:07.455920 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:03:07.480763 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:03:07.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.572000 audit: BPF prog-id=58 op=LOAD Feb 12 22:03:07.572000 audit: BPF prog-id=40 op=UNLOAD Feb 12 22:03:07.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.573000 audit: BPF prog-id=59 op=LOAD Feb 12 22:03:07.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.574000 audit: BPF prog-id=60 op=LOAD Feb 12 22:03:07.574000 audit: BPF prog-id=41 op=UNLOAD Feb 12 22:03:07.574000 audit: BPF prog-id=42 op=UNLOAD Feb 12 22:03:07.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.575000 audit: BPF prog-id=61 op=LOAD Feb 12 22:03:07.575000 audit: BPF prog-id=43 op=UNLOAD Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit: BPF prog-id=62 op=LOAD Feb 12 22:03:07.576000 audit: BPF prog-id=44 op=UNLOAD Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit: BPF prog-id=63 op=LOAD Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.576000 audit: BPF prog-id=64 op=LOAD Feb 12 22:03:07.576000 audit: BPF prog-id=45 op=UNLOAD Feb 12 22:03:07.576000 audit: BPF prog-id=46 op=UNLOAD Feb 12 22:03:07.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit: BPF prog-id=65 op=LOAD Feb 12 22:03:07.578000 audit: BPF prog-id=47 op=UNLOAD Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit: BPF prog-id=66 op=LOAD Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit: BPF prog-id=67 op=LOAD Feb 12 22:03:07.578000 audit: BPF prog-id=48 op=UNLOAD Feb 12 22:03:07.578000 audit: BPF prog-id=49 op=UNLOAD Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit: BPF prog-id=68 op=LOAD Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.578000 audit: BPF prog-id=69 op=LOAD Feb 12 22:03:07.578000 audit: BPF prog-id=50 op=UNLOAD Feb 12 22:03:07.578000 audit: BPF prog-id=51 op=UNLOAD Feb 12 22:03:07.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.581000 audit: BPF prog-id=70 op=LOAD Feb 12 22:03:07.581000 audit: BPF prog-id=52 op=UNLOAD Feb 12 22:03:07.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit: BPF prog-id=71 op=LOAD Feb 12 22:03:07.585000 audit: BPF prog-id=53 op=UNLOAD Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit: BPF prog-id=72 op=LOAD Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.585000 audit: BPF prog-id=73 op=LOAD Feb 12 22:03:07.585000 audit: BPF prog-id=54 op=UNLOAD Feb 12 22:03:07.585000 audit: BPF prog-id=55 op=UNLOAD Feb 12 22:03:07.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.586000 audit: BPF prog-id=74 op=LOAD Feb 12 22:03:07.586000 audit: BPF prog-id=56 op=UNLOAD Feb 12 22:03:07.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:07.587000 audit: BPF prog-id=75 op=LOAD Feb 12 22:03:07.587000 audit: BPF prog-id=57 op=UNLOAD Feb 12 22:03:07.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:07.609555 systemd[1]: Started kubelet.service. Feb 12 22:03:07.668035 kubelet[2097]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:03:07.668331 kubelet[2097]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 22:03:07.668373 kubelet[2097]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:03:07.668495 kubelet[2097]: I0212 22:03:07.668464 2097 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:03:08.052493 kubelet[2097]: I0212 22:03:08.052466 2097 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 22:03:08.052664 kubelet[2097]: I0212 22:03:08.052636 2097 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:03:08.052949 kubelet[2097]: I0212 22:03:08.052927 2097 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 22:03:08.055617 kubelet[2097]: I0212 22:03:08.055590 2097 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:03:08.061637 kubelet[2097]: I0212 22:03:08.061618 2097 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:03:08.062047 kubelet[2097]: I0212 22:03:08.062025 2097 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:03:08.062312 kubelet[2097]: I0212 22:03:08.062282 2097 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 22:03:08.062466 kubelet[2097]: I0212 22:03:08.062322 2097 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 22:03:08.062466 kubelet[2097]: I0212 22:03:08.062335 2097 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 22:03:08.062560 kubelet[2097]: I0212 22:03:08.062469 2097 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:03:08.062603 kubelet[2097]: I0212 22:03:08.062595 2097 kubelet.go:393] "Attempting to sync node with API server" Feb 12 22:03:08.062951 kubelet[2097]: I0212 22:03:08.062613 2097 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:03:08.063025 kubelet[2097]: I0212 22:03:08.062985 2097 kubelet.go:309] "Adding apiserver pod source" Feb 12 22:03:08.063025 kubelet[2097]: I0212 22:03:08.063009 2097 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:03:08.063189 kubelet[2097]: E0212 22:03:08.063080 2097 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:08.063275 kubelet[2097]: E0212 22:03:08.063119 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:08.064166 kubelet[2097]: I0212 22:03:08.064149 2097 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:03:08.064819 kubelet[2097]: W0212 22:03:08.064803 2097 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 22:03:08.066191 kubelet[2097]: I0212 22:03:08.066175 2097 server.go:1232] "Started kubelet" Feb 12 22:03:08.068411 kubelet[2097]: I0212 22:03:08.068392 2097 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 22:03:08.068931 kubelet[2097]: I0212 22:03:08.068912 2097 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 22:03:08.069400 kubelet[2097]: I0212 22:03:08.069381 2097 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:03:08.070000 audit[2097]: AVC avc: denied { mac_admin } for pid=2097 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.070000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:03:08.070000 audit[2097]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d74690 a1=c000e1c228 a2=c000d74660 a3=25 items=0 ppid=1 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.070000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:03:08.071201 kubelet[2097]: I0212 22:03:08.071188 2097 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:03:08.070000 audit[2097]: AVC avc: denied { mac_admin } for pid=2097 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.070000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:03:08.070000 audit[2097]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb2b60 a1=c000e1c240 a2=c000d74720 a3=25 items=0 ppid=1 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.070000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:03:08.071511 kubelet[2097]: I0212 22:03:08.071441 2097 server.go:462] "Adding debug handlers to kubelet server" Feb 12 22:03:08.071615 kubelet[2097]: I0212 22:03:08.071591 2097 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:03:08.071792 kubelet[2097]: I0212 22:03:08.071779 2097 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:03:08.081088 kubelet[2097]: I0212 22:03:08.081056 2097 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 22:03:08.084570 kubelet[2097]: E0212 22:03:08.084541 2097 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:03:08.084761 kubelet[2097]: E0212 22:03:08.084747 2097 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:03:08.085049 kubelet[2097]: E0212 22:03:08.084934 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad1d672f1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 66149105, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 66149105, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.090585 kubelet[2097]: E0212 22:03:08.090560 2097 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.19.213\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 12 22:03:08.093240 kubelet[2097]: I0212 22:03:08.093185 2097 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:03:08.093372 kubelet[2097]: I0212 22:03:08.093299 2097 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 22:03:08.093624 kubelet[2097]: E0212 22:03:08.093384 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad2f1eecc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 84727500, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 84727500, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.094670 kubelet[2097]: W0212 22:03:08.094465 2097 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.19.213" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 22:03:08.094670 kubelet[2097]: E0212 22:03:08.094501 2097 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.19.213" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 22:03:08.094670 kubelet[2097]: W0212 22:03:08.094537 2097 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 22:03:08.094670 kubelet[2097]: E0212 22:03:08.094549 2097 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 22:03:08.103317 kubelet[2097]: W0212 22:03:08.103288 2097 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:03:08.103610 kubelet[2097]: E0212 22:03:08.103590 2097 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:03:08.132424 kubelet[2097]: I0212 22:03:08.129986 2097 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:03:08.132424 kubelet[2097]: I0212 22:03:08.130017 2097 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:03:08.132424 kubelet[2097]: I0212 22:03:08.130036 2097 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:03:08.132424 kubelet[2097]: E0212 22:03:08.131714 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad59132c4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.19.213 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128719556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128719556, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.135545 kubelet[2097]: I0212 22:03:08.135526 2097 policy_none.go:49] "None policy: Start" Feb 12 22:03:08.136000 audit[2109]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:08.136000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe73f917d0 a2=0 a3=7ffe73f917bc items=0 ppid=2097 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:03:08.137796 kubelet[2097]: E0212 22:03:08.137039 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad5916921", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.19.213 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128733473, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128733473, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.138215 kubelet[2097]: I0212 22:03:08.138199 2097 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:03:08.138320 kubelet[2097]: I0212 22:03:08.138309 2097 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:03:08.137000 audit[2114]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:08.137000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffa922dae0 a2=0 a3=7fffa922dacc items=0 ppid=2097 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:03:08.146136 kubelet[2097]: E0212 22:03:08.146044 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad5936fab", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.19.213 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128866219, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128866219, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.152201 systemd[1]: Created slice kubepods.slice. Feb 12 22:03:08.161967 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 22:03:08.140000 audit[2116]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:08.140000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc3e3933c0 a2=0 a3=7ffc3e3933ac items=0 ppid=2097 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:03:08.166975 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 22:03:08.169000 audit[2121]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:08.169000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffff0283040 a2=0 a3=7ffff028302c items=0 ppid=2097 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:03:08.174707 kubelet[2097]: I0212 22:03:08.174685 2097 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:03:08.178000 audit[2097]: AVC avc: denied { mac_admin } for pid=2097 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.178000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:03:08.178000 audit[2097]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d1c2d0 a1=c000f88018 a2=c000d1c2a0 a3=25 items=0 ppid=1 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.178000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:03:08.179448 kubelet[2097]: I0212 22:03:08.179433 2097 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:03:08.180952 kubelet[2097]: I0212 22:03:08.180589 2097 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:03:08.181723 kubelet[2097]: E0212 22:03:08.181709 2097 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.19.213\" not found" Feb 12 22:03:08.183004 kubelet[2097]: I0212 22:03:08.182982 2097 kubelet_node_status.go:70] "Attempting to register node" node="172.31.19.213" Feb 12 22:03:08.185261 kubelet[2097]: E0212 22:03:08.185198 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad8c3f87a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 182378618, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 182378618, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.186073 kubelet[2097]: E0212 22:03:08.186059 2097 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.19.213" Feb 12 22:03:08.187310 kubelet[2097]: E0212 22:03:08.187227 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad59132c4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.19.213 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128719556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 182937715, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events "172.31.19.213.17b33caad59132c4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.189281 kubelet[2097]: E0212 22:03:08.189228 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad5916921", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.19.213 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128733473, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 182943009, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events "172.31.19.213.17b33caad5916921" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.191580 kubelet[2097]: E0212 22:03:08.190994 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad5936fab", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.19.213 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128866219, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 182946378, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events "172.31.19.213.17b33caad5936fab" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.230000 audit[2127]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:08.230000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc8d160700 a2=0 a3=7ffc8d1606ec items=0 ppid=2097 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 22:03:08.231434 kubelet[2097]: I0212 22:03:08.231400 2097 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 22:03:08.231000 audit[2128]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:08.231000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8f0fe270 a2=0 a3=7ffd8f0fe25c items=0 ppid=2097 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:03:08.232998 kubelet[2097]: I0212 22:03:08.232976 2097 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 22:03:08.233086 kubelet[2097]: I0212 22:03:08.233019 2097 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 22:03:08.233086 kubelet[2097]: I0212 22:03:08.233065 2097 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 22:03:08.233165 kubelet[2097]: E0212 22:03:08.233135 2097 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 22:03:08.233000 audit[2129]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:08.233000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb6e7de00 a2=0 a3=7ffeb6e7ddec items=0 ppid=2097 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:03:08.235000 audit[2130]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:08.235000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeea42f240 a2=0 a3=7ffeea42f22c items=0 ppid=2097 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:03:08.236000 audit[2131]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:08.236000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffecd0eca70 a2=0 a3=7ffecd0eca5c items=0 ppid=2097 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.236000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:03:08.238000 audit[2133]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:08.238000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff6706f90 a2=0 a3=7ffff6706f7c items=0 ppid=2097 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.238000 audit[2132]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:08.238000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff3a7a8d90 a2=0 a3=10e3 items=0 ppid=2097 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:03:08.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:03:08.240154 kubelet[2097]: W0212 22:03:08.240132 2097 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 22:03:08.239000 audit[2134]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:08.239000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffda8c7f4b0 a2=0 a3=7ffda8c7f49c items=0 ppid=2097 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:08.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:03:08.240520 kubelet[2097]: E0212 22:03:08.240318 2097 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 22:03:08.292457 kubelet[2097]: E0212 22:03:08.292425 2097 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.19.213\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 12 22:03:08.387760 kubelet[2097]: I0212 22:03:08.387729 2097 kubelet_node_status.go:70] "Attempting to register node" node="172.31.19.213" Feb 12 22:03:08.389443 kubelet[2097]: E0212 22:03:08.389351 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad59132c4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.19.213 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128719556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 387639640, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events "172.31.19.213.17b33caad59132c4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.389784 kubelet[2097]: E0212 22:03:08.389759 2097 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.19.213" Feb 12 22:03:08.392136 kubelet[2097]: E0212 22:03:08.392056 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad5916921", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.19.213 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128733473, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 387670910, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events "172.31.19.213.17b33caad5916921" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.393829 kubelet[2097]: E0212 22:03:08.393755 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad5936fab", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.19.213 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128866219, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 387675554, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events "172.31.19.213.17b33caad5936fab" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.695025 kubelet[2097]: E0212 22:03:08.694927 2097 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.19.213\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 12 22:03:08.790582 kubelet[2097]: I0212 22:03:08.790542 2097 kubelet_node_status.go:70] "Attempting to register node" node="172.31.19.213" Feb 12 22:03:08.792490 kubelet[2097]: E0212 22:03:08.792467 2097 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.19.213" Feb 12 22:03:08.792714 kubelet[2097]: E0212 22:03:08.792456 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad59132c4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.19.213 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128719556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 790492739, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events "172.31.19.213.17b33caad59132c4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.793769 kubelet[2097]: E0212 22:03:08.793695 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad5916921", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.19.213 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128733473, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 790505183, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events "172.31.19.213.17b33caad5916921" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.794802 kubelet[2097]: E0212 22:03:08.794743 2097 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213.17b33caad5936fab", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.19.213", UID:"172.31.19.213", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.19.213 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.19.213"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 128866219, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 8, 790508951, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.19.213"}': 'events "172.31.19.213.17b33caad5936fab" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:03:08.929612 kubelet[2097]: W0212 22:03:08.929566 2097 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:03:08.929612 kubelet[2097]: E0212 22:03:08.929612 2097 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:03:09.055699 kubelet[2097]: I0212 22:03:09.055308 2097 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 22:03:09.063692 kubelet[2097]: E0212 22:03:09.063635 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:09.472082 kubelet[2097]: E0212 22:03:09.472044 2097 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.19.213" not found Feb 12 22:03:09.501833 kubelet[2097]: E0212 22:03:09.501799 2097 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.19.213\" not found" node="172.31.19.213" Feb 12 22:03:09.594486 kubelet[2097]: I0212 22:03:09.594446 2097 kubelet_node_status.go:70] "Attempting to register node" node="172.31.19.213" Feb 12 22:03:09.603620 kubelet[2097]: I0212 22:03:09.603584 2097 kubelet_node_status.go:73] "Successfully registered node" node="172.31.19.213" Feb 12 22:03:09.795000 audit[1900]: USER_END pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:09.795000 audit[1900]: CRED_DISP pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:09.796059 sudo[1900]: pam_unix(sudo:session): session closed for user root Feb 12 22:03:09.809027 kubelet[2097]: I0212 22:03:09.808997 2097 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 22:03:09.809505 env[1633]: time="2024-02-12T22:03:09.809401141Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 22:03:09.809992 kubelet[2097]: I0212 22:03:09.809979 2097 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 22:03:09.819531 sshd[1897]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:09.820000 audit[1897]: USER_END pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:09.820000 audit[1897]: CRED_DISP pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:09.823428 systemd[1]: sshd@6-172.31.19.213:22-139.178.89.65:60246.service: Deactivated successfully. Feb 12 22:03:09.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.213:22-139.178.89.65:60246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:09.824415 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 22:03:09.825293 systemd-logind[1628]: Session 7 logged out. Waiting for processes to exit. Feb 12 22:03:09.826585 systemd-logind[1628]: Removed session 7. Feb 12 22:03:10.064504 kubelet[2097]: E0212 22:03:10.064396 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:10.064696 kubelet[2097]: I0212 22:03:10.064403 2097 apiserver.go:52] "Watching apiserver" Feb 12 22:03:10.068554 kubelet[2097]: I0212 22:03:10.068518 2097 topology_manager.go:215] "Topology Admit Handler" podUID="b30a48af-9704-4de7-a0d9-09e574ab0cd7" podNamespace="calico-system" podName="csi-node-driver-n89zm" Feb 12 22:03:10.068727 kubelet[2097]: I0212 22:03:10.068619 2097 topology_manager.go:215] "Topology Admit Handler" podUID="e2136101-b2cf-44d4-b733-fc9f7dc19ada" podNamespace="kube-system" podName="kube-proxy-pl5bw" Feb 12 22:03:10.068727 kubelet[2097]: I0212 22:03:10.068715 2097 topology_manager.go:215] "Topology Admit Handler" podUID="297d7e0f-8abb-49d4-a54f-42800ccfeeba" podNamespace="calico-system" podName="calico-node-tgkqb" Feb 12 22:03:10.068951 kubelet[2097]: E0212 22:03:10.068933 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n89zm" podUID="b30a48af-9704-4de7-a0d9-09e574ab0cd7" Feb 12 22:03:10.075474 systemd[1]: Created slice kubepods-besteffort-pod297d7e0f_8abb_49d4_a54f_42800ccfeeba.slice. Feb 12 22:03:10.087537 systemd[1]: Created slice kubepods-besteffort-pode2136101_b2cf_44d4_b733_fc9f7dc19ada.slice. Feb 12 22:03:10.094374 kubelet[2097]: I0212 22:03:10.094344 2097 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:03:10.107360 kubelet[2097]: I0212 22:03:10.107318 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e2136101-b2cf-44d4-b733-fc9f7dc19ada-xtables-lock\") pod \"kube-proxy-pl5bw\" (UID: \"e2136101-b2cf-44d4-b733-fc9f7dc19ada\") " pod="kube-system/kube-proxy-pl5bw" Feb 12 22:03:10.107553 kubelet[2097]: I0212 22:03:10.107387 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/297d7e0f-8abb-49d4-a54f-42800ccfeeba-lib-modules\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.107553 kubelet[2097]: I0212 22:03:10.107423 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/297d7e0f-8abb-49d4-a54f-42800ccfeeba-policysync\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.107553 kubelet[2097]: I0212 22:03:10.107447 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/297d7e0f-8abb-49d4-a54f-42800ccfeeba-cni-log-dir\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.107553 kubelet[2097]: I0212 22:03:10.107473 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b30a48af-9704-4de7-a0d9-09e574ab0cd7-varrun\") pod \"csi-node-driver-n89zm\" (UID: \"b30a48af-9704-4de7-a0d9-09e574ab0cd7\") " pod="calico-system/csi-node-driver-n89zm" Feb 12 22:03:10.107553 kubelet[2097]: I0212 22:03:10.107510 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b30a48af-9704-4de7-a0d9-09e574ab0cd7-registration-dir\") pod \"csi-node-driver-n89zm\" (UID: \"b30a48af-9704-4de7-a0d9-09e574ab0cd7\") " pod="calico-system/csi-node-driver-n89zm" Feb 12 22:03:10.107913 kubelet[2097]: I0212 22:03:10.107563 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-45lsp\" (UniqueName: \"kubernetes.io/projected/b30a48af-9704-4de7-a0d9-09e574ab0cd7-kube-api-access-45lsp\") pod \"csi-node-driver-n89zm\" (UID: \"b30a48af-9704-4de7-a0d9-09e574ab0cd7\") " pod="calico-system/csi-node-driver-n89zm" Feb 12 22:03:10.107913 kubelet[2097]: I0212 22:03:10.107591 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e2136101-b2cf-44d4-b733-fc9f7dc19ada-kube-proxy\") pod \"kube-proxy-pl5bw\" (UID: \"e2136101-b2cf-44d4-b733-fc9f7dc19ada\") " pod="kube-system/kube-proxy-pl5bw" Feb 12 22:03:10.107913 kubelet[2097]: I0212 22:03:10.107633 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m8j88\" (UniqueName: \"kubernetes.io/projected/e2136101-b2cf-44d4-b733-fc9f7dc19ada-kube-api-access-m8j88\") pod \"kube-proxy-pl5bw\" (UID: \"e2136101-b2cf-44d4-b733-fc9f7dc19ada\") " pod="kube-system/kube-proxy-pl5bw" Feb 12 22:03:10.107913 kubelet[2097]: I0212 22:03:10.107688 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/297d7e0f-8abb-49d4-a54f-42800ccfeeba-tigera-ca-bundle\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.107913 kubelet[2097]: I0212 22:03:10.107725 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/297d7e0f-8abb-49d4-a54f-42800ccfeeba-node-certs\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.109089 kubelet[2097]: I0212 22:03:10.107753 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/297d7e0f-8abb-49d4-a54f-42800ccfeeba-var-lib-calico\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.109089 kubelet[2097]: I0212 22:03:10.107987 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/297d7e0f-8abb-49d4-a54f-42800ccfeeba-cni-bin-dir\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.109089 kubelet[2097]: I0212 22:03:10.108075 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b30a48af-9704-4de7-a0d9-09e574ab0cd7-socket-dir\") pod \"csi-node-driver-n89zm\" (UID: \"b30a48af-9704-4de7-a0d9-09e574ab0cd7\") " pod="calico-system/csi-node-driver-n89zm" Feb 12 22:03:10.109089 kubelet[2097]: I0212 22:03:10.108115 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e2136101-b2cf-44d4-b733-fc9f7dc19ada-lib-modules\") pod \"kube-proxy-pl5bw\" (UID: \"e2136101-b2cf-44d4-b733-fc9f7dc19ada\") " pod="kube-system/kube-proxy-pl5bw" Feb 12 22:03:10.109089 kubelet[2097]: I0212 22:03:10.108197 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/297d7e0f-8abb-49d4-a54f-42800ccfeeba-cni-net-dir\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.109431 kubelet[2097]: I0212 22:03:10.109021 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gb6nk\" (UniqueName: \"kubernetes.io/projected/297d7e0f-8abb-49d4-a54f-42800ccfeeba-kube-api-access-gb6nk\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.109431 kubelet[2097]: I0212 22:03:10.109095 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b30a48af-9704-4de7-a0d9-09e574ab0cd7-kubelet-dir\") pod \"csi-node-driver-n89zm\" (UID: \"b30a48af-9704-4de7-a0d9-09e574ab0cd7\") " pod="calico-system/csi-node-driver-n89zm" Feb 12 22:03:10.109431 kubelet[2097]: I0212 22:03:10.109126 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/297d7e0f-8abb-49d4-a54f-42800ccfeeba-xtables-lock\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.109431 kubelet[2097]: I0212 22:03:10.109156 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/297d7e0f-8abb-49d4-a54f-42800ccfeeba-var-run-calico\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.109431 kubelet[2097]: I0212 22:03:10.109198 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/297d7e0f-8abb-49d4-a54f-42800ccfeeba-flexvol-driver-host\") pod \"calico-node-tgkqb\" (UID: \"297d7e0f-8abb-49d4-a54f-42800ccfeeba\") " pod="calico-system/calico-node-tgkqb" Feb 12 22:03:10.222745 kubelet[2097]: E0212 22:03:10.221788 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:03:10.222745 kubelet[2097]: W0212 22:03:10.221812 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:03:10.222745 kubelet[2097]: E0212 22:03:10.221844 2097 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:03:10.223613 kubelet[2097]: E0212 22:03:10.223243 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:03:10.223613 kubelet[2097]: W0212 22:03:10.223350 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:03:10.223613 kubelet[2097]: E0212 22:03:10.223375 2097 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:03:10.225498 kubelet[2097]: E0212 22:03:10.225447 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:03:10.225498 kubelet[2097]: W0212 22:03:10.225484 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:03:10.225717 kubelet[2097]: E0212 22:03:10.225506 2097 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:03:10.263183 kubelet[2097]: E0212 22:03:10.263079 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:03:10.263378 kubelet[2097]: W0212 22:03:10.263347 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:03:10.263575 kubelet[2097]: E0212 22:03:10.263391 2097 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:03:10.263834 kubelet[2097]: E0212 22:03:10.263815 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:03:10.263834 kubelet[2097]: W0212 22:03:10.263830 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:03:10.263971 kubelet[2097]: E0212 22:03:10.263857 2097 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:03:10.264159 kubelet[2097]: E0212 22:03:10.264141 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:03:10.264159 kubelet[2097]: W0212 22:03:10.264157 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:03:10.264245 kubelet[2097]: E0212 22:03:10.264173 2097 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:03:10.384506 env[1633]: time="2024-02-12T22:03:10.384451960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tgkqb,Uid:297d7e0f-8abb-49d4-a54f-42800ccfeeba,Namespace:calico-system,Attempt:0,}" Feb 12 22:03:10.396246 env[1633]: time="2024-02-12T22:03:10.396191614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pl5bw,Uid:e2136101-b2cf-44d4-b733-fc9f7dc19ada,Namespace:kube-system,Attempt:0,}" Feb 12 22:03:11.051749 env[1633]: time="2024-02-12T22:03:11.051702704Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:11.058177 env[1633]: time="2024-02-12T22:03:11.058128664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:11.062546 env[1633]: time="2024-02-12T22:03:11.062454442Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:11.064293 env[1633]: time="2024-02-12T22:03:11.064251224Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:11.064906 kubelet[2097]: E0212 22:03:11.064837 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:11.066397 env[1633]: time="2024-02-12T22:03:11.066363169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:11.078064 env[1633]: time="2024-02-12T22:03:11.078016441Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:11.096424 env[1633]: time="2024-02-12T22:03:11.096372560Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:11.099136 env[1633]: time="2024-02-12T22:03:11.099089926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:11.170505 env[1633]: time="2024-02-12T22:03:11.170428178Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:03:11.170505 env[1633]: time="2024-02-12T22:03:11.170480432Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:03:11.170825 env[1633]: time="2024-02-12T22:03:11.170783480Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:03:11.171147 env[1633]: time="2024-02-12T22:03:11.171102671Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b82fdf64ae8729f174d589746e09d351aefeed40683f578f1d1ea8e7a4ce995d pid=2160 runtime=io.containerd.runc.v2 Feb 12 22:03:11.175422 env[1633]: time="2024-02-12T22:03:11.175002007Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:03:11.175422 env[1633]: time="2024-02-12T22:03:11.175086591Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:03:11.175422 env[1633]: time="2024-02-12T22:03:11.175102848Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:03:11.175763 env[1633]: time="2024-02-12T22:03:11.175627076Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f7cd32f1eb85f4bc15024746b089f29f3a9d498e60f39ebf7e66211dd00d6f1 pid=2161 runtime=io.containerd.runc.v2 Feb 12 22:03:11.195658 systemd[1]: Started cri-containerd-b82fdf64ae8729f174d589746e09d351aefeed40683f578f1d1ea8e7a4ce995d.scope. Feb 12 22:03:11.228987 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount902073212.mount: Deactivated successfully. Feb 12 22:03:11.246672 kernel: kauditd_printk_skb: 482 callbacks suppressed Feb 12 22:03:11.246938 kernel: audit: type=1400 audit(1707775391.235:628): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.247005 kernel: audit: type=1400 audit(1707775391.235:629): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.248924 systemd[1]: Started cri-containerd-1f7cd32f1eb85f4bc15024746b089f29f3a9d498e60f39ebf7e66211dd00d6f1.scope. Feb 12 22:03:11.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.264677 kernel: audit: type=1400 audit(1707775391.235:630): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.279947 kernel: audit: type=1400 audit(1707775391.235:631): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.280232 kernel: audit: type=1400 audit(1707775391.235:632): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.293377 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:03:11.293603 kernel: audit: type=1400 audit(1707775391.235:633): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.293671 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 22:03:11.293705 kernel: audit: backlog limit exceeded Feb 12 22:03:11.293746 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:03:11.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.244000 audit: BPF prog-id=76 op=LOAD Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2160 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:11.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238326664663634616538373239663137346435383937343665303964 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2160 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:11.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238326664663634616538373239663137346435383937343665303964 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit: BPF prog-id=77 op=LOAD Feb 12 22:03:11.251000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d4390 items=0 ppid=2160 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:11.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238326664663634616538373239663137346435383937343665303964 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit: BPF prog-id=78 op=LOAD Feb 12 22:03:11.251000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003d43d8 items=0 ppid=2160 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:11.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238326664663634616538373239663137346435383937343665303964 Feb 12 22:03:11.251000 audit: BPF prog-id=78 op=UNLOAD Feb 12 22:03:11.251000 audit: BPF prog-id=77 op=UNLOAD Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.251000 audit: BPF prog-id=79 op=LOAD Feb 12 22:03:11.251000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d47e8 items=0 ppid=2160 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:11.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238326664663634616538373239663137346435383937343665303964 Feb 12 22:03:11.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2161 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:11.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376364333266316562383566346263313530323437343662303839 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2161 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:11.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376364333266316562383566346263313530323437343662303839 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit: BPF prog-id=81 op=LOAD Feb 12 22:03:11.302000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e7470 items=0 ppid=2161 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:11.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376364333266316562383566346263313530323437343662303839 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.302000 audit: BPF prog-id=82 op=LOAD Feb 12 22:03:11.302000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e74b8 items=0 ppid=2161 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:11.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376364333266316562383566346263313530323437343662303839 Feb 12 22:03:11.303000 audit: BPF prog-id=82 op=UNLOAD Feb 12 22:03:11.303000 audit: BPF prog-id=81 op=UNLOAD Feb 12 22:03:11.303000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.303000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.303000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.303000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.303000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.303000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.303000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.303000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.303000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.303000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:11.303000 audit: BPF prog-id=83 op=LOAD Feb 12 22:03:11.303000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e78c8 items=0 ppid=2161 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:11.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376364333266316562383566346263313530323437343662303839 Feb 12 22:03:11.320623 env[1633]: time="2024-02-12T22:03:11.320551164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tgkqb,Uid:297d7e0f-8abb-49d4-a54f-42800ccfeeba,Namespace:calico-system,Attempt:0,} returns sandbox id \"b82fdf64ae8729f174d589746e09d351aefeed40683f578f1d1ea8e7a4ce995d\"" Feb 12 22:03:11.323707 env[1633]: time="2024-02-12T22:03:11.323628229Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 22:03:11.331917 env[1633]: time="2024-02-12T22:03:11.331851989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pl5bw,Uid:e2136101-b2cf-44d4-b733-fc9f7dc19ada,Namespace:kube-system,Attempt:0,} returns sandbox id \"1f7cd32f1eb85f4bc15024746b089f29f3a9d498e60f39ebf7e66211dd00d6f1\"" Feb 12 22:03:12.065712 kubelet[2097]: E0212 22:03:12.065664 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:12.234425 kubelet[2097]: E0212 22:03:12.233879 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n89zm" podUID="b30a48af-9704-4de7-a0d9-09e574ab0cd7" Feb 12 22:03:13.066855 kubelet[2097]: E0212 22:03:13.066811 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:13.667861 env[1633]: time="2024-02-12T22:03:13.667804751Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:13.671112 env[1633]: time="2024-02-12T22:03:13.671065140Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:13.674493 env[1633]: time="2024-02-12T22:03:13.674449503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:13.677280 env[1633]: time="2024-02-12T22:03:13.677235007Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:13.678401 env[1633]: time="2024-02-12T22:03:13.678360318Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 22:03:13.680954 env[1633]: time="2024-02-12T22:03:13.680919087Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 22:03:13.682943 env[1633]: time="2024-02-12T22:03:13.682900824Z" level=info msg="CreateContainer within sandbox \"b82fdf64ae8729f174d589746e09d351aefeed40683f578f1d1ea8e7a4ce995d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 22:03:13.708345 env[1633]: time="2024-02-12T22:03:13.708288953Z" level=info msg="CreateContainer within sandbox \"b82fdf64ae8729f174d589746e09d351aefeed40683f578f1d1ea8e7a4ce995d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"08a47d3ef2fe1d14f9ce975ba896658ba1bd6dbdc79f1b08a64e07678ffb88c5\"" Feb 12 22:03:13.709327 env[1633]: time="2024-02-12T22:03:13.709294025Z" level=info msg="StartContainer for \"08a47d3ef2fe1d14f9ce975ba896658ba1bd6dbdc79f1b08a64e07678ffb88c5\"" Feb 12 22:03:13.741368 systemd[1]: run-containerd-runc-k8s.io-08a47d3ef2fe1d14f9ce975ba896658ba1bd6dbdc79f1b08a64e07678ffb88c5-runc.7xGSOD.mount: Deactivated successfully. Feb 12 22:03:13.748470 systemd[1]: Started cri-containerd-08a47d3ef2fe1d14f9ce975ba896658ba1bd6dbdc79f1b08a64e07678ffb88c5.scope. Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2ca05e1208 items=0 ppid=2160 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:13.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038613437643365663266653164313466396365393735626138393636 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit: BPF prog-id=84 op=LOAD Feb 12 22:03:13.770000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000254b38 items=0 ppid=2160 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:13.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038613437643365663266653164313466396365393735626138393636 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit: BPF prog-id=85 op=LOAD Feb 12 22:03:13.770000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000254b88 items=0 ppid=2160 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:13.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038613437643365663266653164313466396365393735626138393636 Feb 12 22:03:13.770000 audit: BPF prog-id=85 op=UNLOAD Feb 12 22:03:13.770000 audit: BPF prog-id=84 op=UNLOAD Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:13.770000 audit: BPF prog-id=86 op=LOAD Feb 12 22:03:13.770000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000254c18 items=0 ppid=2160 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:13.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038613437643365663266653164313466396365393735626138393636 Feb 12 22:03:13.802783 env[1633]: time="2024-02-12T22:03:13.802551369Z" level=info msg="StartContainer for \"08a47d3ef2fe1d14f9ce975ba896658ba1bd6dbdc79f1b08a64e07678ffb88c5\" returns successfully" Feb 12 22:03:13.813938 systemd[1]: cri-containerd-08a47d3ef2fe1d14f9ce975ba896658ba1bd6dbdc79f1b08a64e07678ffb88c5.scope: Deactivated successfully. Feb 12 22:03:13.816000 audit: BPF prog-id=86 op=UNLOAD Feb 12 22:03:13.845967 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-08a47d3ef2fe1d14f9ce975ba896658ba1bd6dbdc79f1b08a64e07678ffb88c5-rootfs.mount: Deactivated successfully. Feb 12 22:03:13.951334 env[1633]: time="2024-02-12T22:03:13.948908792Z" level=info msg="shim disconnected" id=08a47d3ef2fe1d14f9ce975ba896658ba1bd6dbdc79f1b08a64e07678ffb88c5 Feb 12 22:03:13.951334 env[1633]: time="2024-02-12T22:03:13.948959972Z" level=warning msg="cleaning up after shim disconnected" id=08a47d3ef2fe1d14f9ce975ba896658ba1bd6dbdc79f1b08a64e07678ffb88c5 namespace=k8s.io Feb 12 22:03:13.951334 env[1633]: time="2024-02-12T22:03:13.948973321Z" level=info msg="cleaning up dead shim" Feb 12 22:03:13.960142 env[1633]: time="2024-02-12T22:03:13.960093042Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:03:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2280 runtime=io.containerd.runc.v2\n" Feb 12 22:03:14.066946 kubelet[2097]: E0212 22:03:14.066903 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:14.236725 kubelet[2097]: E0212 22:03:14.234714 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n89zm" podUID="b30a48af-9704-4de7-a0d9-09e574ab0cd7" Feb 12 22:03:14.913185 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1702301338.mount: Deactivated successfully. Feb 12 22:03:15.067608 kubelet[2097]: E0212 22:03:15.067558 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:15.738279 env[1633]: time="2024-02-12T22:03:15.738220257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:15.741357 env[1633]: time="2024-02-12T22:03:15.741311174Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:15.743760 env[1633]: time="2024-02-12T22:03:15.743721792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:15.745612 env[1633]: time="2024-02-12T22:03:15.745576236Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:15.746128 env[1633]: time="2024-02-12T22:03:15.746085897Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 12 22:03:15.748248 env[1633]: time="2024-02-12T22:03:15.748192492Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 22:03:15.748996 env[1633]: time="2024-02-12T22:03:15.748964463Z" level=info msg="CreateContainer within sandbox \"1f7cd32f1eb85f4bc15024746b089f29f3a9d498e60f39ebf7e66211dd00d6f1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 22:03:15.782919 env[1633]: time="2024-02-12T22:03:15.782865074Z" level=info msg="CreateContainer within sandbox \"1f7cd32f1eb85f4bc15024746b089f29f3a9d498e60f39ebf7e66211dd00d6f1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5ba6ee0b2750776056776b736ffc571ea230e856e60d059fe1bf2eb04b67ff00\"" Feb 12 22:03:15.783784 env[1633]: time="2024-02-12T22:03:15.783749122Z" level=info msg="StartContainer for \"5ba6ee0b2750776056776b736ffc571ea230e856e60d059fe1bf2eb04b67ff00\"" Feb 12 22:03:15.811474 systemd[1]: Started cri-containerd-5ba6ee0b2750776056776b736ffc571ea230e856e60d059fe1bf2eb04b67ff00.scope. Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f92969608b8 items=0 ppid=2161 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:15.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562613665653062323735303737363035363737366237333666666335 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit: BPF prog-id=87 op=LOAD Feb 12 22:03:15.830000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000388898 items=0 ppid=2161 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:15.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562613665653062323735303737363035363737366237333666666335 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit: BPF prog-id=88 op=LOAD Feb 12 22:03:15.830000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003888e8 items=0 ppid=2161 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:15.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562613665653062323735303737363035363737366237333666666335 Feb 12 22:03:15.830000 audit: BPF prog-id=88 op=UNLOAD Feb 12 22:03:15.830000 audit: BPF prog-id=87 op=UNLOAD Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:15.830000 audit: BPF prog-id=89 op=LOAD Feb 12 22:03:15.830000 audit[2308]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000388978 items=0 ppid=2161 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:15.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562613665653062323735303737363035363737366237333666666335 Feb 12 22:03:15.850094 env[1633]: time="2024-02-12T22:03:15.850031897Z" level=info msg="StartContainer for \"5ba6ee0b2750776056776b736ffc571ea230e856e60d059fe1bf2eb04b67ff00\" returns successfully" Feb 12 22:03:15.988000 audit[2360]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:15.988000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeaba96720 a2=0 a3=7ffeaba9670c items=0 ppid=2319 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:15.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:03:15.992000 audit[2361]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:15.992000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc585cebf0 a2=0 a3=7ffc585cebdc items=0 ppid=2319 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:15.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:03:15.993000 audit[2362]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:15.993000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5db51340 a2=0 a3=7ffc5db5132c items=0 ppid=2319 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:15.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:03:15.994000 audit[2363]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:15.994000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc74984e60 a2=0 a3=7ffc74984e4c items=0 ppid=2319 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:15.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:03:15.995000 audit[2364]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:15.995000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef5f7f800 a2=0 a3=7ffef5f7f7ec items=0 ppid=2319 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:15.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:03:15.996000 audit[2365]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:15.996000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca0eab050 a2=0 a3=7ffca0eab03c items=0 ppid=2319 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:15.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:03:16.068152 kubelet[2097]: E0212 22:03:16.068106 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:16.091000 audit[2366]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.091000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff6148afc0 a2=0 a3=7fff6148afac items=0 ppid=2319 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:03:16.100000 audit[2368]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.100000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffccfbbc200 a2=0 a3=7ffccfbbc1ec items=0 ppid=2319 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 22:03:16.106000 audit[2371]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.106000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc768a8e0 a2=0 a3=7ffcc768a8cc items=0 ppid=2319 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 22:03:16.107000 audit[2372]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.107000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd11a00ab0 a2=0 a3=7ffd11a00a9c items=0 ppid=2319 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:03:16.112000 audit[2374]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.112000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb617c080 a2=0 a3=7ffeb617c06c items=0 ppid=2319 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:03:16.114000 audit[2375]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.114000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9e89f6e0 a2=0 a3=7fff9e89f6cc items=0 ppid=2319 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:03:16.118000 audit[2377]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.118000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe9359140 a2=0 a3=7fffe935912c items=0 ppid=2319 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:03:16.123000 audit[2380]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.123000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc0d898c20 a2=0 a3=7ffc0d898c0c items=0 ppid=2319 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 22:03:16.124000 audit[2381]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.124000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec7af9760 a2=0 a3=7ffec7af974c items=0 ppid=2319 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:03:16.129000 audit[2383]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.129000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff27547c30 a2=0 a3=7fff27547c1c items=0 ppid=2319 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:03:16.130000 audit[2384]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.130000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe83425180 a2=0 a3=7ffe8342516c items=0 ppid=2319 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:03:16.134000 audit[2386]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.134000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeeb763540 a2=0 a3=7ffeeb76352c items=0 ppid=2319 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:03:16.139000 audit[2389]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.139000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff05738ba0 a2=0 a3=7fff05738b8c items=0 ppid=2319 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:03:16.143000 audit[2392]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.143000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf25aefc0 a2=0 a3=7ffcf25aefac items=0 ppid=2319 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:03:16.145000 audit[2393]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.145000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd4bf97540 a2=0 a3=7ffd4bf9752c items=0 ppid=2319 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:03:16.148000 audit[2395]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.148000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdaceb8820 a2=0 a3=7ffdaceb880c items=0 ppid=2319 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:03:16.176000 audit[2400]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.176000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe071fc0d0 a2=0 a3=7ffe071fc0bc items=0 ppid=2319 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:03:16.178000 audit[2401]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.178000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed3fc7580 a2=0 a3=7ffed3fc756c items=0 ppid=2319 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:03:16.181000 audit[2403]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:16.181000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffff229c0b0 a2=0 a3=7ffff229c09c items=0 ppid=2319 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:03:16.192000 audit[2409]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:03:16.192000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd085368b0 a2=0 a3=7ffd0853689c items=0 ppid=2319 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:03:16.217000 audit[2409]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:03:16.217000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd085368b0 a2=0 a3=7ffd0853689c items=0 ppid=2319 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:03:16.232000 audit[2417]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.232000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc71445ee0 a2=0 a3=7ffc71445ecc items=0 ppid=2319 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:03:16.236213 kubelet[2097]: E0212 22:03:16.235892 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n89zm" podUID="b30a48af-9704-4de7-a0d9-09e574ab0cd7" Feb 12 22:03:16.254826 kernel: kauditd_printk_skb: 279 callbacks suppressed Feb 12 22:03:16.254976 kernel: audit: type=1325 audit(1707775396.237:703): table=filter:42 family=10 entries=2 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.255015 kernel: audit: type=1300 audit(1707775396.237:703): arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffefc65a960 a2=0 a3=7ffefc65a94c items=0 ppid=2319 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.237000 audit[2419]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.237000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffefc65a960 a2=0 a3=7ffefc65a94c items=0 ppid=2319 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 22:03:16.275869 kernel: audit: type=1327 audit(1707775396.237:703): proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 22:03:16.240000 audit[2422]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.292241 kernel: audit: type=1325 audit(1707775396.240:704): table=filter:43 family=10 entries=2 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.292370 kernel: audit: type=1300 audit(1707775396.240:704): arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcee22a0e0 a2=0 a3=7ffcee22a0cc items=0 ppid=2319 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.240000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcee22a0e0 a2=0 a3=7ffcee22a0cc items=0 ppid=2319 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 22:03:16.309395 kernel: audit: type=1327 audit(1707775396.240:704): proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 22:03:16.309538 kernel: audit: type=1325 audit(1707775396.245:705): table=filter:44 family=10 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.245000 audit[2423]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.245000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd39bf18d0 a2=0 a3=7ffd39bf18bc items=0 ppid=2319 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.320749 kernel: audit: type=1300 audit(1707775396.245:705): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd39bf18d0 a2=0 a3=7ffd39bf18bc items=0 ppid=2319 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:03:16.325669 kernel: audit: type=1327 audit(1707775396.245:705): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:03:16.245000 audit[2425]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.330721 kernel: audit: type=1325 audit(1707775396.245:706): table=filter:45 family=10 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.245000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccc00fa00 a2=0 a3=7ffccc00f9ec items=0 ppid=2319 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:03:16.250000 audit[2426]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.250000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc94eee30 a2=0 a3=7fffc94eee1c items=0 ppid=2319 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:03:16.255000 audit[2428]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.255000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd9fac6b60 a2=0 a3=7ffd9fac6b4c items=0 ppid=2319 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 22:03:16.262000 audit[2431]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.262000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc89bd2b80 a2=0 a3=7ffc89bd2b6c items=0 ppid=2319 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:03:16.263000 audit[2432]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.263000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc46f63250 a2=0 a3=7ffc46f6323c items=0 ppid=2319 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:03:16.266000 audit[2434]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.266000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd899178e0 a2=0 a3=7ffd899178cc items=0 ppid=2319 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:03:16.266000 audit[2435]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.266000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb4133ae0 a2=0 a3=7ffdb4133acc items=0 ppid=2319 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:03:16.271000 audit[2437]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.271000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1c677e10 a2=0 a3=7fff1c677dfc items=0 ppid=2319 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:03:16.280000 audit[2440]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.280000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd38452360 a2=0 a3=7ffd3845234c items=0 ppid=2319 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:03:16.286000 audit[2443]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.286000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe93ab6f20 a2=0 a3=7ffe93ab6f0c items=0 ppid=2319 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 22:03:16.291000 audit[2444]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.291000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc76836e0 a2=0 a3=7ffcc76836cc items=0 ppid=2319 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:03:16.293000 audit[2446]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.293000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff63085310 a2=0 a3=7fff630852fc items=0 ppid=2319 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:03:16.299000 audit[2449]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.299000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff97bd5df0 a2=0 a3=7fff97bd5ddc items=0 ppid=2319 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:03:16.304000 audit[2450]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.304000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffecdd21b60 a2=0 a3=7ffecdd21b4c items=0 ppid=2319 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:03:16.309000 audit[2452]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.309000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc3eea88a0 a2=0 a3=7ffc3eea888c items=0 ppid=2319 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:03:16.309000 audit[2453]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.309000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd75817ab0 a2=0 a3=7ffd75817a9c items=0 ppid=2319 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:03:16.336000 audit[2455]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.336000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffca8a69f80 a2=0 a3=7ffca8a69f6c items=0 ppid=2319 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:03:16.342000 audit[2458]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:16.342000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdfc51bec0 a2=0 a3=7ffdfc51beac items=0 ppid=2319 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.342000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:03:16.347000 audit[2460]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:03:16.347000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff50307480 a2=0 a3=7fff5030746c items=0 ppid=2319 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.347000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:03:16.348000 audit[2460]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:03:16.348000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff50307480 a2=0 a3=7fff5030746c items=0 ppid=2319 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:16.348000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:03:17.069196 kubelet[2097]: E0212 22:03:17.069140 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:18.069821 kubelet[2097]: E0212 22:03:18.069613 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:18.234257 kubelet[2097]: E0212 22:03:18.234218 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n89zm" podUID="b30a48af-9704-4de7-a0d9-09e574ab0cd7" Feb 12 22:03:19.069852 kubelet[2097]: E0212 22:03:19.069757 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:20.070873 kubelet[2097]: E0212 22:03:20.070785 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:20.234530 kubelet[2097]: E0212 22:03:20.234084 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n89zm" podUID="b30a48af-9704-4de7-a0d9-09e574ab0cd7" Feb 12 22:03:21.071835 kubelet[2097]: E0212 22:03:21.071799 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:21.298349 env[1633]: time="2024-02-12T22:03:21.298299907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:21.302690 env[1633]: time="2024-02-12T22:03:21.302636638Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:21.307702 env[1633]: time="2024-02-12T22:03:21.307638468Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:21.312131 env[1633]: time="2024-02-12T22:03:21.312089062Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:21.316834 env[1633]: time="2024-02-12T22:03:21.314317606Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 22:03:21.321620 env[1633]: time="2024-02-12T22:03:21.321574129Z" level=info msg="CreateContainer within sandbox \"b82fdf64ae8729f174d589746e09d351aefeed40683f578f1d1ea8e7a4ce995d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 22:03:21.352010 env[1633]: time="2024-02-12T22:03:21.351761131Z" level=info msg="CreateContainer within sandbox \"b82fdf64ae8729f174d589746e09d351aefeed40683f578f1d1ea8e7a4ce995d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cc7504ee3ef143209f4fbd2b5fc8bef01ab4e232c6b9e565fd72c96ebf59da3e\"" Feb 12 22:03:21.356722 env[1633]: time="2024-02-12T22:03:21.356441251Z" level=info msg="StartContainer for \"cc7504ee3ef143209f4fbd2b5fc8bef01ab4e232c6b9e565fd72c96ebf59da3e\"" Feb 12 22:03:21.414345 systemd[1]: Started cri-containerd-cc7504ee3ef143209f4fbd2b5fc8bef01ab4e232c6b9e565fd72c96ebf59da3e.scope. Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.434596 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 12 22:03:21.434759 kernel: audit: type=1400 audit(1707775401.432:726): avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa3d702c468 items=0 ppid=2160 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:21.448447 kernel: audit: type=1300 audit(1707775401.432:726): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa3d702c468 items=0 ppid=2160 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:21.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373530346565336566313433323039663466626432623566633862 Feb 12 22:03:21.456105 kernel: audit: type=1327 audit(1707775401.432:726): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373530346565336566313433323039663466626432623566633862 Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.461894 kernel: audit: type=1400 audit(1707775401.432:727): avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.462083 kernel: audit: type=1400 audit(1707775401.432:727): avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.472667 kernel: audit: type=1400 audit(1707775401.432:727): avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.479101 kernel: audit: type=1400 audit(1707775401.432:727): avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.479230 kernel: audit: type=1400 audit(1707775401.432:727): avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.497693 kernel: audit: type=1400 audit(1707775401.432:727): avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.497856 kernel: audit: type=1400 audit(1707775401.432:727): avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.432000 audit: BPF prog-id=90 op=LOAD Feb 12 22:03:21.432000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000341ee8 items=0 ppid=2160 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:21.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373530346565336566313433323039663466626432623566633862 Feb 12 22:03:21.439000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.439000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.439000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.439000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.439000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.439000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.439000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.439000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.439000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.439000 audit: BPF prog-id=91 op=LOAD Feb 12 22:03:21.439000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000341f38 items=0 ppid=2160 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:21.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373530346565336566313433323039663466626432623566633862 Feb 12 22:03:21.448000 audit: BPF prog-id=91 op=UNLOAD Feb 12 22:03:21.448000 audit: BPF prog-id=90 op=UNLOAD Feb 12 22:03:21.448000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.448000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.448000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.448000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.448000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.448000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.448000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.448000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.448000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.448000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:21.448000 audit: BPF prog-id=92 op=LOAD Feb 12 22:03:21.448000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000341fc8 items=0 ppid=2160 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:21.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373530346565336566313433323039663466626432623566633862 Feb 12 22:03:21.507290 env[1633]: time="2024-02-12T22:03:21.507243720Z" level=info msg="StartContainer for \"cc7504ee3ef143209f4fbd2b5fc8bef01ab4e232c6b9e565fd72c96ebf59da3e\" returns successfully" Feb 12 22:03:22.073373 kubelet[2097]: E0212 22:03:22.073307 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:22.233576 kubelet[2097]: E0212 22:03:22.233542 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n89zm" podUID="b30a48af-9704-4de7-a0d9-09e574ab0cd7" Feb 12 22:03:22.338387 kubelet[2097]: I0212 22:03:22.338267 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-pl5bw" podStartSLOduration=6.924723935 podCreationTimestamp="2024-02-12 22:03:11 +0000 UTC" firstStartedPulling="2024-02-12 22:03:11.333248498 +0000 UTC m=+3.717688325" lastFinishedPulling="2024-02-12 22:03:15.746753025 +0000 UTC m=+8.131192853" observedRunningTime="2024-02-12 22:03:16.350848811 +0000 UTC m=+8.735288641" watchObservedRunningTime="2024-02-12 22:03:22.338228463 +0000 UTC m=+14.722668296" Feb 12 22:03:22.479009 env[1633]: time="2024-02-12T22:03:22.478939106Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:03:22.483912 systemd[1]: cri-containerd-cc7504ee3ef143209f4fbd2b5fc8bef01ab4e232c6b9e565fd72c96ebf59da3e.scope: Deactivated successfully. Feb 12 22:03:22.487000 audit: BPF prog-id=92 op=UNLOAD Feb 12 22:03:22.513996 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cc7504ee3ef143209f4fbd2b5fc8bef01ab4e232c6b9e565fd72c96ebf59da3e-rootfs.mount: Deactivated successfully. Feb 12 22:03:22.529875 kubelet[2097]: I0212 22:03:22.529553 2097 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 22:03:23.074265 kubelet[2097]: E0212 22:03:23.074210 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:23.109797 env[1633]: time="2024-02-12T22:03:23.109745639Z" level=info msg="shim disconnected" id=cc7504ee3ef143209f4fbd2b5fc8bef01ab4e232c6b9e565fd72c96ebf59da3e Feb 12 22:03:23.110016 env[1633]: time="2024-02-12T22:03:23.109800300Z" level=warning msg="cleaning up after shim disconnected" id=cc7504ee3ef143209f4fbd2b5fc8bef01ab4e232c6b9e565fd72c96ebf59da3e namespace=k8s.io Feb 12 22:03:23.110016 env[1633]: time="2024-02-12T22:03:23.109813350Z" level=info msg="cleaning up dead shim" Feb 12 22:03:23.118962 env[1633]: time="2024-02-12T22:03:23.118914397Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:03:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2517 runtime=io.containerd.runc.v2\n" Feb 12 22:03:23.290945 env[1633]: time="2024-02-12T22:03:23.290854317Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 22:03:24.075285 kubelet[2097]: E0212 22:03:24.075229 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:24.240056 systemd[1]: Created slice kubepods-besteffort-podb30a48af_9704_4de7_a0d9_09e574ab0cd7.slice. Feb 12 22:03:24.243687 env[1633]: time="2024-02-12T22:03:24.243337505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n89zm,Uid:b30a48af-9704-4de7-a0d9-09e574ab0cd7,Namespace:calico-system,Attempt:0,}" Feb 12 22:03:24.370976 env[1633]: time="2024-02-12T22:03:24.368295588Z" level=error msg="Failed to destroy network for sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:03:24.370199 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366-shm.mount: Deactivated successfully. Feb 12 22:03:24.371214 env[1633]: time="2024-02-12T22:03:24.371129837Z" level=error msg="encountered an error cleaning up failed sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:03:24.371265 env[1633]: time="2024-02-12T22:03:24.371208346Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n89zm,Uid:b30a48af-9704-4de7-a0d9-09e574ab0cd7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:03:24.371505 kubelet[2097]: E0212 22:03:24.371477 2097 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:03:24.371622 kubelet[2097]: E0212 22:03:24.371541 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-n89zm" Feb 12 22:03:24.371622 kubelet[2097]: E0212 22:03:24.371588 2097 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-n89zm" Feb 12 22:03:24.371823 kubelet[2097]: E0212 22:03:24.371752 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-n89zm_calico-system(b30a48af-9704-4de7-a0d9-09e574ab0cd7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-n89zm_calico-system(b30a48af-9704-4de7-a0d9-09e574ab0cd7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-n89zm" podUID="b30a48af-9704-4de7-a0d9-09e574ab0cd7" Feb 12 22:03:26.209793 systemd-resolved[1589]: Clock change detected. Flushing caches. Feb 12 22:03:26.211006 systemd-timesyncd[1591]: Contacted time server 162.159.200.1:123 (2.flatcar.pool.ntp.org). Feb 12 22:03:26.211757 systemd-timesyncd[1591]: Initial clock synchronization to Mon 2024-02-12 22:03:26.209144 UTC. Feb 12 22:03:26.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:26.306468 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 12 22:03:26.325000 audit: BPF prog-id=60 op=UNLOAD Feb 12 22:03:26.325000 audit: BPF prog-id=59 op=UNLOAD Feb 12 22:03:26.325000 audit: BPF prog-id=58 op=UNLOAD Feb 12 22:03:26.479010 kubelet[2097]: E0212 22:03:26.478854 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:26.698265 kubelet[2097]: I0212 22:03:26.698194 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:03:26.700462 env[1633]: time="2024-02-12T22:03:26.700420144Z" level=info msg="StopPodSandbox for \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\"" Feb 12 22:03:26.795182 env[1633]: time="2024-02-12T22:03:26.795118532Z" level=error msg="StopPodSandbox for \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\" failed" error="failed to destroy network for sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:03:26.795528 kubelet[2097]: E0212 22:03:26.795506 2097 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:03:26.795678 kubelet[2097]: E0212 22:03:26.795659 2097 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366"} Feb 12 22:03:26.795739 kubelet[2097]: E0212 22:03:26.795718 2097 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b30a48af-9704-4de7-a0d9-09e574ab0cd7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:03:26.795836 kubelet[2097]: E0212 22:03:26.795765 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b30a48af-9704-4de7-a0d9-09e574ab0cd7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-n89zm" podUID="b30a48af-9704-4de7-a0d9-09e574ab0cd7" Feb 12 22:03:27.479602 kubelet[2097]: E0212 22:03:27.479515 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:28.480837 kubelet[2097]: E0212 22:03:28.480651 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:29.466784 kubelet[2097]: E0212 22:03:29.466743 2097 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:29.481947 kubelet[2097]: E0212 22:03:29.481860 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:30.484363 kubelet[2097]: E0212 22:03:30.484299 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:30.498985 kubelet[2097]: I0212 22:03:30.497604 2097 topology_manager.go:215] "Topology Admit Handler" podUID="60f3fc8f-9bef-428b-802f-1f4626c92d4d" podNamespace="default" podName="nginx-deployment-6d5f899847-ml48x" Feb 12 22:03:30.511834 systemd[1]: Created slice kubepods-besteffort-pod60f3fc8f_9bef_428b_802f_1f4626c92d4d.slice. Feb 12 22:03:30.648509 kubelet[2097]: I0212 22:03:30.648473 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dl5x5\" (UniqueName: \"kubernetes.io/projected/60f3fc8f-9bef-428b-802f-1f4626c92d4d-kube-api-access-dl5x5\") pod \"nginx-deployment-6d5f899847-ml48x\" (UID: \"60f3fc8f-9bef-428b-802f-1f4626c92d4d\") " pod="default/nginx-deployment-6d5f899847-ml48x" Feb 12 22:03:30.821533 env[1633]: time="2024-02-12T22:03:30.821054352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ml48x,Uid:60f3fc8f-9bef-428b-802f-1f4626c92d4d,Namespace:default,Attempt:0,}" Feb 12 22:03:30.943890 amazon-ssm-agent[1773]: 2024-02-12 22:03:30 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 12 22:03:31.010243 env[1633]: time="2024-02-12T22:03:31.010175533Z" level=error msg="Failed to destroy network for sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:03:31.012518 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f-shm.mount: Deactivated successfully. Feb 12 22:03:31.013906 env[1633]: time="2024-02-12T22:03:31.013818896Z" level=error msg="encountered an error cleaning up failed sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:03:31.014025 env[1633]: time="2024-02-12T22:03:31.013911063Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ml48x,Uid:60f3fc8f-9bef-428b-802f-1f4626c92d4d,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:03:31.014210 kubelet[2097]: E0212 22:03:31.014182 2097 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:03:31.014298 kubelet[2097]: E0212 22:03:31.014246 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-ml48x" Feb 12 22:03:31.014298 kubelet[2097]: E0212 22:03:31.014275 2097 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-ml48x" Feb 12 22:03:31.014384 kubelet[2097]: E0212 22:03:31.014346 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-ml48x_default(60f3fc8f-9bef-428b-802f-1f4626c92d4d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-ml48x_default(60f3fc8f-9bef-428b-802f-1f4626c92d4d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-ml48x" podUID="60f3fc8f-9bef-428b-802f-1f4626c92d4d" Feb 12 22:03:31.485400 kubelet[2097]: E0212 22:03:31.485309 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:31.707006 kubelet[2097]: I0212 22:03:31.706982 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:03:31.707949 env[1633]: time="2024-02-12T22:03:31.707903723Z" level=info msg="StopPodSandbox for \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\"" Feb 12 22:03:31.793117 env[1633]: time="2024-02-12T22:03:31.793047005Z" level=error msg="StopPodSandbox for \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\" failed" error="failed to destroy network for sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:03:31.793360 kubelet[2097]: E0212 22:03:31.793338 2097 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:03:31.793466 kubelet[2097]: E0212 22:03:31.793392 2097 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f"} Feb 12 22:03:31.793466 kubelet[2097]: E0212 22:03:31.793446 2097 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"60f3fc8f-9bef-428b-802f-1f4626c92d4d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:03:31.793603 kubelet[2097]: E0212 22:03:31.793490 2097 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"60f3fc8f-9bef-428b-802f-1f4626c92d4d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-ml48x" podUID="60f3fc8f-9bef-428b-802f-1f4626c92d4d" Feb 12 22:03:32.439205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4118494340.mount: Deactivated successfully. Feb 12 22:03:32.485569 kubelet[2097]: E0212 22:03:32.485528 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:32.520018 env[1633]: time="2024-02-12T22:03:32.519961677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:32.523709 env[1633]: time="2024-02-12T22:03:32.523648581Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:32.527659 env[1633]: time="2024-02-12T22:03:32.527603978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:32.529773 env[1633]: time="2024-02-12T22:03:32.529734264Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:32.530572 env[1633]: time="2024-02-12T22:03:32.530532786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 22:03:32.559008 env[1633]: time="2024-02-12T22:03:32.558964672Z" level=info msg="CreateContainer within sandbox \"b82fdf64ae8729f174d589746e09d351aefeed40683f578f1d1ea8e7a4ce995d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 22:03:32.583138 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2592560266.mount: Deactivated successfully. Feb 12 22:03:32.591097 env[1633]: time="2024-02-12T22:03:32.591041787Z" level=info msg="CreateContainer within sandbox \"b82fdf64ae8729f174d589746e09d351aefeed40683f578f1d1ea8e7a4ce995d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5a3e258c01093571d8d55031e235a9e63caeb960c19b7a2eaa1e01d93d36ab9c\"" Feb 12 22:03:32.591863 env[1633]: time="2024-02-12T22:03:32.591823233Z" level=info msg="StartContainer for \"5a3e258c01093571d8d55031e235a9e63caeb960c19b7a2eaa1e01d93d36ab9c\"" Feb 12 22:03:32.617772 systemd[1]: Started cri-containerd-5a3e258c01093571d8d55031e235a9e63caeb960c19b7a2eaa1e01d93d36ab9c.scope. Feb 12 22:03:32.650373 kernel: kauditd_printk_skb: 38 callbacks suppressed Feb 12 22:03:32.650540 kernel: audit: type=1400 audit(1707775412.641:737): avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f39ae26f2f8 items=0 ppid=2160 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:32.658940 kernel: audit: type=1300 audit(1707775412.641:737): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f39ae26f2f8 items=0 ppid=2160 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:32.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561336532353863303130393335373164386435353033316532333561 Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.673288 kernel: audit: type=1327 audit(1707775412.641:737): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561336532353863303130393335373164386435353033316532333561 Feb 12 22:03:32.673421 kernel: audit: type=1400 audit(1707775412.641:738): avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.673464 kernel: audit: type=1400 audit(1707775412.641:738): avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.685613 kernel: audit: type=1400 audit(1707775412.641:738): avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.685740 kernel: audit: type=1400 audit(1707775412.641:738): avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.701011 kernel: audit: type=1400 audit(1707775412.641:738): avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.701169 kernel: audit: type=1400 audit(1707775412.641:738): avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.703149 kernel: audit: type=1400 audit(1707775412.641:738): avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.703628 env[1633]: time="2024-02-12T22:03:32.703574112Z" level=info msg="StartContainer for \"5a3e258c01093571d8d55031e235a9e63caeb960c19b7a2eaa1e01d93d36ab9c\" returns successfully" Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.641000 audit: BPF prog-id=93 op=LOAD Feb 12 22:03:32.641000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0000242f8 items=0 ppid=2160 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:32.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561336532353863303130393335373164386435353033316532333561 Feb 12 22:03:32.644000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.644000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.644000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.644000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.644000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.644000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.644000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.644000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.644000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.644000 audit: BPF prog-id=94 op=LOAD Feb 12 22:03:32.644000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000024348 items=0 ppid=2160 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:32.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561336532353863303130393335373164386435353033316532333561 Feb 12 22:03:32.649000 audit: BPF prog-id=94 op=UNLOAD Feb 12 22:03:32.649000 audit: BPF prog-id=93 op=UNLOAD Feb 12 22:03:32.649000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.649000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.649000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.649000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.649000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.649000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.649000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.649000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.649000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.649000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.649000 audit: BPF prog-id=95 op=LOAD Feb 12 22:03:32.649000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0000243d8 items=0 ppid=2160 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:32.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561336532353863303130393335373164386435353033316532333561 Feb 12 22:03:32.731492 kubelet[2097]: I0212 22:03:32.731455 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-tgkqb" podStartSLOduration=1.925960138 podCreationTimestamp="2024-02-12 22:03:11 +0000 UTC" firstStartedPulling="2024-02-12 22:03:11.32272037 +0000 UTC m=+3.707160186" lastFinishedPulling="2024-02-12 22:03:32.531393722 +0000 UTC m=+23.512604302" observedRunningTime="2024-02-12 22:03:32.731388607 +0000 UTC m=+23.712599206" watchObservedRunningTime="2024-02-12 22:03:32.731404254 +0000 UTC m=+23.712614851" Feb 12 22:03:32.774270 amazon-ssm-agent[1773]: 2024-02-12 22:03:32 INFO [HealthCheck] HealthCheck reporting agent health. Feb 12 22:03:32.819974 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 22:03:32.820132 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 22:03:33.486195 kubelet[2097]: E0212 22:03:33.486119 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:34.235000 audit[2809]: AVC avc: denied { write } for pid=2809 comm="tee" name="fd" dev="proc" ino=19222 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:03:34.242000 audit[2811]: AVC avc: denied { write } for pid=2811 comm="tee" name="fd" dev="proc" ino=19233 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:03:34.235000 audit[2809]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcea7f1986 a2=241 a3=1b6 items=1 ppid=2784 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.235000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 22:03:34.235000 audit: PATH item=0 name="/dev/fd/63" inode=19219 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:03:34.235000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:03:34.248000 audit[2826]: AVC avc: denied { write } for pid=2826 comm="tee" name="fd" dev="proc" ino=19237 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:03:34.242000 audit[2811]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0e8b6984 a2=241 a3=1b6 items=1 ppid=2782 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.242000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 22:03:34.242000 audit: PATH item=0 name="/dev/fd/63" inode=20159 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:03:34.242000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:03:34.250000 audit[2825]: AVC avc: denied { write } for pid=2825 comm="tee" name="fd" dev="proc" ino=19241 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:03:34.250000 audit[2830]: AVC avc: denied { write } for pid=2830 comm="tee" name="fd" dev="proc" ino=20174 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:03:34.248000 audit[2826]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef02df975 a2=241 a3=1b6 items=1 ppid=2781 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.248000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 22:03:34.248000 audit: PATH item=0 name="/dev/fd/63" inode=19225 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:03:34.248000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:03:34.250000 audit[2825]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc54842974 a2=241 a3=1b6 items=1 ppid=2789 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.250000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 22:03:34.250000 audit: PATH item=0 name="/dev/fd/63" inode=20164 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:03:34.250000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:03:34.250000 audit[2830]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe90dc4984 a2=241 a3=1b6 items=1 ppid=2785 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.250000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 22:03:34.250000 audit: PATH item=0 name="/dev/fd/63" inode=19230 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:03:34.250000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:03:34.266000 audit[2828]: AVC avc: denied { write } for pid=2828 comm="tee" name="fd" dev="proc" ino=20187 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:03:34.266000 audit[2828]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd38cce985 a2=241 a3=1b6 items=1 ppid=2792 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.266000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 22:03:34.266000 audit: PATH item=0 name="/dev/fd/63" inode=20165 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:03:34.266000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:03:34.270000 audit[2849]: AVC avc: denied { write } for pid=2849 comm="tee" name="fd" dev="proc" ino=19252 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:03:34.270000 audit[2849]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcdd434984 a2=241 a3=1b6 items=1 ppid=2779 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.270000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 22:03:34.270000 audit: PATH item=0 name="/dev/fd/63" inode=20181 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:03:34.270000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:03:34.486455 kubelet[2097]: E0212 22:03:34.486405 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:34.593361 kernel: Initializing XFRM netlink socket Feb 12 22:03:34.761523 (udev-worker)[2684]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:03:34.761524 (udev-worker)[2683]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:03:34.772000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.772000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.772000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.772000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.772000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.772000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.772000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.772000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.772000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.772000 audit: BPF prog-id=96 op=LOAD Feb 12 22:03:34.772000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc320df770 a2=70 a3=7efeb6a5f000 items=0 ppid=2787 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.772000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:03:34.773000 audit: BPF prog-id=96 op=UNLOAD Feb 12 22:03:34.773000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.773000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.773000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.773000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.773000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.773000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.773000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.773000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.773000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.773000 audit: BPF prog-id=97 op=LOAD Feb 12 22:03:34.773000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc320df770 a2=70 a3=6e items=0 ppid=2787 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.773000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:03:34.773000 audit: BPF prog-id=97 op=UNLOAD Feb 12 22:03:34.773000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.773000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc320df720 a2=70 a3=7ffc320df770 items=0 ppid=2787 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.773000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:03:34.774000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.774000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.774000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.774000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.774000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.774000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.774000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.774000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.774000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.774000 audit: BPF prog-id=98 op=LOAD Feb 12 22:03:34.774000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc320df700 a2=70 a3=7ffc320df770 items=0 ppid=2787 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.774000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:03:34.776000 audit: BPF prog-id=98 op=UNLOAD Feb 12 22:03:34.776000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.776000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc320df7e0 a2=70 a3=0 items=0 ppid=2787 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:03:34.776000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.776000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc320df7d0 a2=70 a3=0 items=0 ppid=2787 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:03:34.776000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.776000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc320df810 a2=70 a3=0 items=0 ppid=2787 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.776000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:03:34.778000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.778000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.778000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.778000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.778000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.778000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.778000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.778000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.778000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.778000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.778000 audit: BPF prog-id=99 op=LOAD Feb 12 22:03:34.778000 audit[2932]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc320df730 a2=70 a3=ffffffff items=0 ppid=2787 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.778000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:03:34.798000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.798000 audit[2941]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8cc03aa0 a2=70 a3=fff80800 items=0 ppid=2787 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.798000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:03:34.799000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.799000 audit[2941]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8cc03970 a2=70 a3=3 items=0 ppid=2787 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.799000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:03:34.803000 audit: BPF prog-id=99 op=UNLOAD Feb 12 22:03:34.803000 audit[2943]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7f61a9541023 a2=80000 a3=0 items=1 ppid=2787 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip" exe="/usr/sbin/ip" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.803000 audit: CWD cwd="/etc/service/enabled/felix" Feb 12 22:03:34.803000 audit: PATH item=0 name="/proc/mounts" inode=20375 dev=00:55 mode=0100444 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:03:34.803000 audit: PROCTITLE proctitle=6970006C696E6B0064656C0063616C69636F5F746D705F41 Feb 12 22:03:34.874000 audit[2963]: NETFILTER_CFG table=mangle:65 family=2 entries=19 op=nft_register_chain pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:03:34.874000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffcd42f6a00 a2=0 a3=7ffcd42f69ec items=0 ppid=2787 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.874000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:03:34.883000 audit[2962]: NETFILTER_CFG table=nat:66 family=2 entries=16 op=nft_register_chain pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:03:34.883000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc5e045d00 a2=0 a3=55ca70b46000 items=0 ppid=2787 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.883000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:03:34.885000 audit[2961]: NETFILTER_CFG table=raw:67 family=2 entries=19 op=nft_register_chain pid=2961 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:03:34.885000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff0cc93ad0 a2=0 a3=559ff7fac000 items=0 ppid=2787 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.885000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:03:34.897000 audit[2968]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:03:34.897000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc00da2f60 a2=0 a3=7ffc00da2f4c items=0 ppid=2787 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.897000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:03:35.487586 kubelet[2097]: E0212 22:03:35.487530 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:35.614900 systemd-networkd[1457]: vxlan.calico: Link UP Feb 12 22:03:35.614912 systemd-networkd[1457]: vxlan.calico: Gained carrier Feb 12 22:03:36.488107 kubelet[2097]: E0212 22:03:36.488028 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:37.005064 systemd-networkd[1457]: vxlan.calico: Gained IPv6LL Feb 12 22:03:37.488438 kubelet[2097]: E0212 22:03:37.488381 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:38.489416 kubelet[2097]: E0212 22:03:38.489363 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:39.490206 kubelet[2097]: E0212 22:03:39.490159 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:39.639412 env[1633]: time="2024-02-12T22:03:39.639366390Z" level=info msg="StopPodSandbox for \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\"" Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.750 [INFO][2990] k8s.go 578: Cleaning up netns ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.750 [INFO][2990] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" iface="eth0" netns="/var/run/netns/cni-9fb29021-63cb-7215-25ee-8223f466b5c4" Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.751 [INFO][2990] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" iface="eth0" netns="/var/run/netns/cni-9fb29021-63cb-7215-25ee-8223f466b5c4" Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.754 [INFO][2990] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" iface="eth0" netns="/var/run/netns/cni-9fb29021-63cb-7215-25ee-8223f466b5c4" Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.754 [INFO][2990] k8s.go 585: Releasing IP address(es) ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.754 [INFO][2990] utils.go 188: Calico CNI releasing IP address ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.958 [INFO][2996] ipam_plugin.go 415: Releasing address using handleID ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" HandleID="k8s-pod-network.606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.958 [INFO][2996] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.958 [INFO][2996] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.973 [WARNING][2996] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" HandleID="k8s-pod-network.606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.973 [INFO][2996] ipam_plugin.go 443: Releasing address using workloadID ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" HandleID="k8s-pod-network.606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.977 [INFO][2996] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:03:39.979813 env[1633]: 2024-02-12 22:03:39.978 [INFO][2990] k8s.go 591: Teardown processing complete. ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:03:39.984702 systemd[1]: run-netns-cni\x2d9fb29021\x2d63cb\x2d7215\x2d25ee\x2d8223f466b5c4.mount: Deactivated successfully. Feb 12 22:03:39.986197 env[1633]: time="2024-02-12T22:03:39.986149614Z" level=info msg="TearDown network for sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\" successfully" Feb 12 22:03:39.986197 env[1633]: time="2024-02-12T22:03:39.986192400Z" level=info msg="StopPodSandbox for \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\" returns successfully" Feb 12 22:03:39.987061 env[1633]: time="2024-02-12T22:03:39.987023265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n89zm,Uid:b30a48af-9704-4de7-a0d9-09e574ab0cd7,Namespace:calico-system,Attempt:1,}" Feb 12 22:03:40.217590 systemd-networkd[1457]: calie4610eb320f: Link UP Feb 12 22:03:40.222958 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:03:40.223063 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie4610eb320f: link becomes ready Feb 12 22:03:40.222617 systemd-networkd[1457]: calie4610eb320f: Gained carrier Feb 12 22:03:40.224411 (udev-worker)[3029]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.071 [INFO][3011] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.213-k8s-csi--node--driver--n89zm-eth0 csi-node-driver- calico-system b30a48af-9704-4de7-a0d9-09e574ab0cd7 926 0 2024-02-12 22:03:11 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.19.213 csi-node-driver-n89zm eth0 default [] [] [kns.calico-system ksa.calico-system.default] calie4610eb320f [] []}} ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Namespace="calico-system" Pod="csi-node-driver-n89zm" WorkloadEndpoint="172.31.19.213-k8s-csi--node--driver--n89zm-" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.072 [INFO][3011] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Namespace="calico-system" Pod="csi-node-driver-n89zm" WorkloadEndpoint="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.121 [INFO][3022] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" HandleID="k8s-pod-network.550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.148 [INFO][3022] ipam_plugin.go 268: Auto assigning IP ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" HandleID="k8s-pod-network.550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d820), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.19.213", "pod":"csi-node-driver-n89zm", "timestamp":"2024-02-12 22:03:40.121770711 +0000 UTC"}, Hostname:"172.31.19.213", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.148 [INFO][3022] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.148 [INFO][3022] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.148 [INFO][3022] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.213' Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.151 [INFO][3022] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" host="172.31.19.213" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.173 [INFO][3022] ipam.go 372: Looking up existing affinities for host host="172.31.19.213" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.186 [INFO][3022] ipam.go 489: Trying affinity for 192.168.39.192/26 host="172.31.19.213" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.191 [INFO][3022] ipam.go 155: Attempting to load block cidr=192.168.39.192/26 host="172.31.19.213" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.195 [INFO][3022] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.39.192/26 host="172.31.19.213" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.195 [INFO][3022] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.39.192/26 handle="k8s-pod-network.550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" host="172.31.19.213" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.198 [INFO][3022] ipam.go 1682: Creating new handle: k8s-pod-network.550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.203 [INFO][3022] ipam.go 1203: Writing block in order to claim IPs block=192.168.39.192/26 handle="k8s-pod-network.550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" host="172.31.19.213" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.210 [INFO][3022] ipam.go 1216: Successfully claimed IPs: [192.168.39.193/26] block=192.168.39.192/26 handle="k8s-pod-network.550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" host="172.31.19.213" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.211 [INFO][3022] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.39.193/26] handle="k8s-pod-network.550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" host="172.31.19.213" Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.211 [INFO][3022] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:03:40.260944 env[1633]: 2024-02-12 22:03:40.211 [INFO][3022] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.39.193/26] IPv6=[] ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" HandleID="k8s-pod-network.550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:03:40.262024 env[1633]: 2024-02-12 22:03:40.213 [INFO][3011] k8s.go 385: Populated endpoint ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Namespace="calico-system" Pod="csi-node-driver-n89zm" WorkloadEndpoint="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-csi--node--driver--n89zm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b30a48af-9704-4de7-a0d9-09e574ab0cd7", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"", Pod:"csi-node-driver-n89zm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.39.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie4610eb320f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:03:40.262024 env[1633]: 2024-02-12 22:03:40.213 [INFO][3011] k8s.go 386: Calico CNI using IPs: [192.168.39.193/32] ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Namespace="calico-system" Pod="csi-node-driver-n89zm" WorkloadEndpoint="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:03:40.262024 env[1633]: 2024-02-12 22:03:40.213 [INFO][3011] dataplane_linux.go 68: Setting the host side veth name to calie4610eb320f ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Namespace="calico-system" Pod="csi-node-driver-n89zm" WorkloadEndpoint="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:03:40.262024 env[1633]: 2024-02-12 22:03:40.223 [INFO][3011] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Namespace="calico-system" Pod="csi-node-driver-n89zm" WorkloadEndpoint="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:03:40.262024 env[1633]: 2024-02-12 22:03:40.225 [INFO][3011] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Namespace="calico-system" Pod="csi-node-driver-n89zm" WorkloadEndpoint="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-csi--node--driver--n89zm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b30a48af-9704-4de7-a0d9-09e574ab0cd7", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe", Pod:"csi-node-driver-n89zm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.39.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie4610eb320f", MAC:"fa:4b:03:ca:fc:f5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:03:40.262024 env[1633]: 2024-02-12 22:03:40.257 [INFO][3011] k8s.go 491: Wrote updated endpoint to datastore ContainerID="550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe" Namespace="calico-system" Pod="csi-node-driver-n89zm" WorkloadEndpoint="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:03:40.276102 env[1633]: time="2024-02-12T22:03:40.276001222Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:03:40.276354 env[1633]: time="2024-02-12T22:03:40.276051758Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:03:40.276354 env[1633]: time="2024-02-12T22:03:40.276334004Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:03:40.276802 env[1633]: time="2024-02-12T22:03:40.276754886Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe pid=3048 runtime=io.containerd.runc.v2 Feb 12 22:03:40.311319 systemd[1]: Started cri-containerd-550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe.scope. Feb 12 22:03:40.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.334954 kernel: kauditd_printk_skb: 155 callbacks suppressed Feb 12 22:03:40.335302 kernel: audit: type=1400 audit(1707775420.331:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.346343 kernel: audit: type=1400 audit(1707775420.331:769): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.352955 kernel: audit: type=1400 audit(1707775420.331:770): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.365982 kernel: audit: type=1400 audit(1707775420.331:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.366093 kernel: audit: type=1400 audit(1707775420.331:772): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.384932 kernel: audit: type=1400 audit(1707775420.332:773): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.388736 env[1633]: time="2024-02-12T22:03:40.388690992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n89zm,Uid:b30a48af-9704-4de7-a0d9-09e574ab0cd7,Namespace:calico-system,Attempt:1,} returns sandbox id \"550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe\"" Feb 12 22:03:40.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.396092 kernel: audit: type=1400 audit(1707775420.332:774): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.396149 env[1633]: time="2024-02-12T22:03:40.392188920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 22:03:40.402858 update_engine[1629]: I0212 22:03:40.402477 1629 update_attempter.cc:509] Updating boot flags... Feb 12 22:03:40.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.409934 kernel: audit: type=1400 audit(1707775420.332:775): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.437838 kernel: audit: type=1400 audit(1707775420.332:776): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.438009 kernel: audit: type=1400 audit(1707775420.332:777): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit: BPF prog-id=100 op=LOAD Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3048 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:40.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306234336333633633373735366166313337363564326631363662 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3048 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:40.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306234336333633633373735366166313337363564326631363662 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.332000 audit: BPF prog-id=101 op=LOAD Feb 12 22:03:40.332000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003d0bb0 items=0 ppid=3048 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:40.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306234336333633633373735366166313337363564326631363662 Feb 12 22:03:40.339000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.339000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.339000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.339000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.339000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.339000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.339000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.339000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.339000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.339000 audit: BPF prog-id=102 op=LOAD Feb 12 22:03:40.339000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003d0bf8 items=0 ppid=3048 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:40.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306234336333633633373735366166313337363564326631363662 Feb 12 22:03:40.358000 audit: BPF prog-id=102 op=UNLOAD Feb 12 22:03:40.358000 audit: BPF prog-id=101 op=UNLOAD Feb 12 22:03:40.358000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.358000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.358000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.358000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.358000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.358000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.358000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.358000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.358000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.358000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:40.358000 audit: BPF prog-id=103 op=LOAD Feb 12 22:03:40.358000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003d1008 items=0 ppid=3048 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:40.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306234336333633633373735366166313337363564326631363662 Feb 12 22:03:40.425000 audit[3088]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:03:40.425000 audit[3088]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd97e96240 a2=0 a3=7ffd97e9622c items=0 ppid=2787 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:40.425000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:03:40.491871 kubelet[2097]: E0212 22:03:40.491832 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:41.492532 kubelet[2097]: E0212 22:03:41.492479 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:41.842139 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2356745323.mount: Deactivated successfully. Feb 12 22:03:42.062422 systemd-networkd[1457]: calie4610eb320f: Gained IPv6LL Feb 12 22:03:42.359412 env[1633]: time="2024-02-12T22:03:42.359360791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:42.377676 env[1633]: time="2024-02-12T22:03:42.377629049Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:42.387633 env[1633]: time="2024-02-12T22:03:42.387586636Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:42.392559 env[1633]: time="2024-02-12T22:03:42.392507293Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:42.394032 env[1633]: time="2024-02-12T22:03:42.393628111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 22:03:42.397086 env[1633]: time="2024-02-12T22:03:42.397047480Z" level=info msg="CreateContainer within sandbox \"550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 22:03:42.466652 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1787417617.mount: Deactivated successfully. Feb 12 22:03:42.491064 env[1633]: time="2024-02-12T22:03:42.490971612Z" level=info msg="CreateContainer within sandbox \"550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f4ec6bfb28102a89a658be3467eb4a6ca977eca4b28c04704a217b55afea88e7\"" Feb 12 22:03:42.493374 kubelet[2097]: E0212 22:03:42.492616 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:42.494095 env[1633]: time="2024-02-12T22:03:42.493399642Z" level=info msg="StartContainer for \"f4ec6bfb28102a89a658be3467eb4a6ca977eca4b28c04704a217b55afea88e7\"" Feb 12 22:03:42.527693 systemd[1]: Started cri-containerd-f4ec6bfb28102a89a658be3467eb4a6ca977eca4b28c04704a217b55afea88e7.scope. Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f87fc575958 items=0 ppid=3048 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:42.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634656336626662323831303261383961363538626533343637656234 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit: BPF prog-id=104 op=LOAD Feb 12 22:03:42.552000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000282c48 items=0 ppid=3048 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:42.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634656336626662323831303261383961363538626533343637656234 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit: BPF prog-id=105 op=LOAD Feb 12 22:03:42.552000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000282c98 items=0 ppid=3048 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:42.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634656336626662323831303261383961363538626533343637656234 Feb 12 22:03:42.552000 audit: BPF prog-id=105 op=UNLOAD Feb 12 22:03:42.552000 audit: BPF prog-id=104 op=UNLOAD Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:42.552000 audit: BPF prog-id=106 op=LOAD Feb 12 22:03:42.552000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000282d28 items=0 ppid=3048 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:42.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634656336626662323831303261383961363538626533343637656234 Feb 12 22:03:42.576703 env[1633]: time="2024-02-12T22:03:42.576652750Z" level=info msg="StartContainer for \"f4ec6bfb28102a89a658be3467eb4a6ca977eca4b28c04704a217b55afea88e7\" returns successfully" Feb 12 22:03:42.579941 env[1633]: time="2024-02-12T22:03:42.579903029Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 22:03:43.493490 kubelet[2097]: E0212 22:03:43.493443 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:44.387844 env[1633]: time="2024-02-12T22:03:44.387794024Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:44.391002 env[1633]: time="2024-02-12T22:03:44.390940379Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:44.393985 env[1633]: time="2024-02-12T22:03:44.393951636Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:44.396491 env[1633]: time="2024-02-12T22:03:44.396452744Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:44.397187 env[1633]: time="2024-02-12T22:03:44.397154973Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 22:03:44.399713 env[1633]: time="2024-02-12T22:03:44.399593179Z" level=info msg="CreateContainer within sandbox \"550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 22:03:44.423675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1359616435.mount: Deactivated successfully. Feb 12 22:03:44.429787 env[1633]: time="2024-02-12T22:03:44.429739373Z" level=info msg="CreateContainer within sandbox \"550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3bac399ad879ed6254b7898a09e0022b86b45d167fc737c2082d96fddb7ed58b\"" Feb 12 22:03:44.430678 env[1633]: time="2024-02-12T22:03:44.430625329Z" level=info msg="StartContainer for \"3bac399ad879ed6254b7898a09e0022b86b45d167fc737c2082d96fddb7ed58b\"" Feb 12 22:03:44.475219 systemd[1]: Started cri-containerd-3bac399ad879ed6254b7898a09e0022b86b45d167fc737c2082d96fddb7ed58b.scope. Feb 12 22:03:44.493980 kubelet[2097]: E0212 22:03:44.493943 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f91f8b522f8 items=0 ppid=3048 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:44.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616333393961643837396564363235346237383938613039653030 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit: BPF prog-id=107 op=LOAD Feb 12 22:03:44.499000 audit[3225]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024d18 items=0 ppid=3048 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:44.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616333393961643837396564363235346237383938613039653030 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.499000 audit: BPF prog-id=108 op=LOAD Feb 12 22:03:44.499000 audit[3225]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024d68 items=0 ppid=3048 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:44.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616333393961643837396564363235346237383938613039653030 Feb 12 22:03:44.500000 audit: BPF prog-id=108 op=UNLOAD Feb 12 22:03:44.500000 audit: BPF prog-id=107 op=UNLOAD Feb 12 22:03:44.500000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.500000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.500000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.500000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.500000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.500000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.500000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.500000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.500000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.500000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:44.500000 audit: BPF prog-id=109 op=LOAD Feb 12 22:03:44.500000 audit[3225]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024df8 items=0 ppid=3048 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:44.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616333393961643837396564363235346237383938613039653030 Feb 12 22:03:44.520463 env[1633]: time="2024-02-12T22:03:44.520313410Z" level=info msg="StartContainer for \"3bac399ad879ed6254b7898a09e0022b86b45d167fc737c2082d96fddb7ed58b\" returns successfully" Feb 12 22:03:44.615375 kubelet[2097]: I0212 22:03:44.615338 2097 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 22:03:44.616564 kubelet[2097]: I0212 22:03:44.616517 2097 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 22:03:45.417545 systemd[1]: run-containerd-runc-k8s.io-3bac399ad879ed6254b7898a09e0022b86b45d167fc737c2082d96fddb7ed58b-runc.5UYWzo.mount: Deactivated successfully. Feb 12 22:03:45.494963 kubelet[2097]: E0212 22:03:45.494918 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:46.495445 kubelet[2097]: E0212 22:03:46.495400 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:46.637192 env[1633]: time="2024-02-12T22:03:46.637146653Z" level=info msg="StopPodSandbox for \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\"" Feb 12 22:03:46.693141 kubelet[2097]: I0212 22:03:46.693106 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-n89zm" podStartSLOduration=31.68646984 podCreationTimestamp="2024-02-12 22:03:11 +0000 UTC" firstStartedPulling="2024-02-12 22:03:40.390994287 +0000 UTC m=+31.372204868" lastFinishedPulling="2024-02-12 22:03:44.397576674 +0000 UTC m=+35.378787273" observedRunningTime="2024-02-12 22:03:44.7875733 +0000 UTC m=+35.768783898" watchObservedRunningTime="2024-02-12 22:03:46.693052245 +0000 UTC m=+37.674262835" Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.693 [INFO][3277] k8s.go 578: Cleaning up netns ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.693 [INFO][3277] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" iface="eth0" netns="/var/run/netns/cni-25d3e343-b2e9-ab2c-e18a-b94a667bcf7f" Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.693 [INFO][3277] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" iface="eth0" netns="/var/run/netns/cni-25d3e343-b2e9-ab2c-e18a-b94a667bcf7f" Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.694 [INFO][3277] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" iface="eth0" netns="/var/run/netns/cni-25d3e343-b2e9-ab2c-e18a-b94a667bcf7f" Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.694 [INFO][3277] k8s.go 585: Releasing IP address(es) ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.694 [INFO][3277] utils.go 188: Calico CNI releasing IP address ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.722 [INFO][3283] ipam_plugin.go 415: Releasing address using handleID ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" HandleID="k8s-pod-network.7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.722 [INFO][3283] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.723 [INFO][3283] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.731 [WARNING][3283] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" HandleID="k8s-pod-network.7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.731 [INFO][3283] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" HandleID="k8s-pod-network.7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.733 [INFO][3283] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:03:46.736201 env[1633]: 2024-02-12 22:03:46.734 [INFO][3277] k8s.go 591: Teardown processing complete. ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:03:46.737178 env[1633]: time="2024-02-12T22:03:46.737139523Z" level=info msg="TearDown network for sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\" successfully" Feb 12 22:03:46.737289 env[1633]: time="2024-02-12T22:03:46.737267543Z" level=info msg="StopPodSandbox for \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\" returns successfully" Feb 12 22:03:46.738118 env[1633]: time="2024-02-12T22:03:46.738073977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ml48x,Uid:60f3fc8f-9bef-428b-802f-1f4626c92d4d,Namespace:default,Attempt:1,}" Feb 12 22:03:46.739131 systemd[1]: run-netns-cni\x2d25d3e343\x2db2e9\x2dab2c\x2de18a\x2db94a667bcf7f.mount: Deactivated successfully. Feb 12 22:03:46.945792 systemd-networkd[1457]: cali595efe8081c: Link UP Feb 12 22:03:46.949691 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:03:46.950767 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali595efe8081c: link becomes ready Feb 12 22:03:46.950011 systemd-networkd[1457]: cali595efe8081c: Gained carrier Feb 12 22:03:46.951362 (udev-worker)[3307]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.857 [INFO][3289] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0 nginx-deployment-6d5f899847- default 60f3fc8f-9bef-428b-802f-1f4626c92d4d 957 0 2024-02-12 22:03:30 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.19.213 nginx-deployment-6d5f899847-ml48x eth0 default [] [] [kns.default ksa.default.default] cali595efe8081c [] []}} ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Namespace="default" Pod="nginx-deployment-6d5f899847-ml48x" WorkloadEndpoint="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.857 [INFO][3289] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Namespace="default" Pod="nginx-deployment-6d5f899847-ml48x" WorkloadEndpoint="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.896 [INFO][3301] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" HandleID="k8s-pod-network.49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.906 [INFO][3301] ipam_plugin.go 268: Auto assigning IP ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" HandleID="k8s-pod-network.49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027c840), Attrs:map[string]string{"namespace":"default", "node":"172.31.19.213", "pod":"nginx-deployment-6d5f899847-ml48x", "timestamp":"2024-02-12 22:03:46.895990602 +0000 UTC"}, Hostname:"172.31.19.213", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.906 [INFO][3301] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.906 [INFO][3301] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.906 [INFO][3301] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.213' Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.908 [INFO][3301] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" host="172.31.19.213" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.912 [INFO][3301] ipam.go 372: Looking up existing affinities for host host="172.31.19.213" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.918 [INFO][3301] ipam.go 489: Trying affinity for 192.168.39.192/26 host="172.31.19.213" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.920 [INFO][3301] ipam.go 155: Attempting to load block cidr=192.168.39.192/26 host="172.31.19.213" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.922 [INFO][3301] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.39.192/26 host="172.31.19.213" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.922 [INFO][3301] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.39.192/26 handle="k8s-pod-network.49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" host="172.31.19.213" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.924 [INFO][3301] ipam.go 1682: Creating new handle: k8s-pod-network.49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.928 [INFO][3301] ipam.go 1203: Writing block in order to claim IPs block=192.168.39.192/26 handle="k8s-pod-network.49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" host="172.31.19.213" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.936 [INFO][3301] ipam.go 1216: Successfully claimed IPs: [192.168.39.194/26] block=192.168.39.192/26 handle="k8s-pod-network.49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" host="172.31.19.213" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.936 [INFO][3301] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.39.194/26] handle="k8s-pod-network.49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" host="172.31.19.213" Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.936 [INFO][3301] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:03:46.968725 env[1633]: 2024-02-12 22:03:46.937 [INFO][3301] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.39.194/26] IPv6=[] ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" HandleID="k8s-pod-network.49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:03:46.970108 env[1633]: 2024-02-12 22:03:46.939 [INFO][3289] k8s.go 385: Populated endpoint ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Namespace="default" Pod="nginx-deployment-6d5f899847-ml48x" WorkloadEndpoint="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"60f3fc8f-9bef-428b-802f-1f4626c92d4d", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"", Pod:"nginx-deployment-6d5f899847-ml48x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.39.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali595efe8081c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:03:46.970108 env[1633]: 2024-02-12 22:03:46.939 [INFO][3289] k8s.go 386: Calico CNI using IPs: [192.168.39.194/32] ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Namespace="default" Pod="nginx-deployment-6d5f899847-ml48x" WorkloadEndpoint="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:03:46.970108 env[1633]: 2024-02-12 22:03:46.939 [INFO][3289] dataplane_linux.go 68: Setting the host side veth name to cali595efe8081c ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Namespace="default" Pod="nginx-deployment-6d5f899847-ml48x" WorkloadEndpoint="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:03:46.970108 env[1633]: 2024-02-12 22:03:46.950 [INFO][3289] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Namespace="default" Pod="nginx-deployment-6d5f899847-ml48x" WorkloadEndpoint="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:03:46.970108 env[1633]: 2024-02-12 22:03:46.950 [INFO][3289] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Namespace="default" Pod="nginx-deployment-6d5f899847-ml48x" WorkloadEndpoint="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"60f3fc8f-9bef-428b-802f-1f4626c92d4d", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b", Pod:"nginx-deployment-6d5f899847-ml48x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.39.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali595efe8081c", MAC:"7e:15:38:e2:74:c8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:03:46.970108 env[1633]: 2024-02-12 22:03:46.957 [INFO][3289] k8s.go 491: Wrote updated endpoint to datastore ContainerID="49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b" Namespace="default" Pod="nginx-deployment-6d5f899847-ml48x" WorkloadEndpoint="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:03:47.012048 kernel: kauditd_printk_skb: 136 callbacks suppressed Feb 12 22:03:47.012170 kernel: audit: type=1325 audit(1707775427.000:799): table=filter:70 family=2 entries=40 op=nft_register_chain pid=3323 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:03:47.000000 audit[3323]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=3323 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:03:47.012320 env[1633]: time="2024-02-12T22:03:47.004534643Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:03:47.012320 env[1633]: time="2024-02-12T22:03:47.004635823Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:03:47.012320 env[1633]: time="2024-02-12T22:03:47.004671743Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:03:47.012320 env[1633]: time="2024-02-12T22:03:47.004848413Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b pid=3332 runtime=io.containerd.runc.v2 Feb 12 22:03:47.000000 audit[3323]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffda90f4b80 a2=0 a3=7ffda90f4b6c items=0 ppid=2787 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:47.024205 kernel: audit: type=1300 audit(1707775427.000:799): arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffda90f4b80 a2=0 a3=7ffda90f4b6c items=0 ppid=2787 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:47.000000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:03:47.031914 kernel: audit: type=1327 audit(1707775427.000:799): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:03:47.048471 systemd[1]: Started cri-containerd-49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b.scope. Feb 12 22:03:47.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.082160 kernel: audit: type=1400 audit(1707775427.068:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.082322 kernel: audit: type=1400 audit(1707775427.068:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.088486 kernel: audit: type=1400 audit(1707775427.068:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.094840 kernel: audit: type=1400 audit(1707775427.068:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.105963 kernel: audit: type=1400 audit(1707775427.068:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.106064 kernel: audit: type=1400 audit(1707775427.068:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.074000 audit: BPF prog-id=110 op=LOAD Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3332 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:47.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439666164653765343335633238393333653862313832303562303530 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3332 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:47.112898 kernel: audit: type=1400 audit(1707775427.068:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439666164653765343335633238393333653862313832303562303530 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.075000 audit: BPF prog-id=111 op=LOAD Feb 12 22:03:47.075000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003da330 items=0 ppid=3332 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:47.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439666164653765343335633238393333653862313832303562303530 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit: BPF prog-id=112 op=LOAD Feb 12 22:03:47.081000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003da378 items=0 ppid=3332 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:47.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439666164653765343335633238393333653862313832303562303530 Feb 12 22:03:47.081000 audit: BPF prog-id=112 op=UNLOAD Feb 12 22:03:47.081000 audit: BPF prog-id=111 op=UNLOAD Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:47.081000 audit: BPF prog-id=113 op=LOAD Feb 12 22:03:47.081000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003da788 items=0 ppid=3332 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:47.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439666164653765343335633238393333653862313832303562303530 Feb 12 22:03:47.176234 env[1633]: time="2024-02-12T22:03:47.176184656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ml48x,Uid:60f3fc8f-9bef-428b-802f-1f4626c92d4d,Namespace:default,Attempt:1,} returns sandbox id \"49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b\"" Feb 12 22:03:47.178594 env[1633]: time="2024-02-12T22:03:47.178553303Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 22:03:47.495590 kubelet[2097]: E0212 22:03:47.495541 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:47.739461 systemd[1]: run-containerd-runc-k8s.io-49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b-runc.c38NfQ.mount: Deactivated successfully. Feb 12 22:03:48.495887 kubelet[2097]: E0212 22:03:48.495834 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:48.717978 systemd-networkd[1457]: cali595efe8081c: Gained IPv6LL Feb 12 22:03:49.467455 kubelet[2097]: E0212 22:03:49.467383 2097 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:49.497009 kubelet[2097]: E0212 22:03:49.496948 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:50.497833 kubelet[2097]: E0212 22:03:50.497789 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:50.799155 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3372627650.mount: Deactivated successfully. Feb 12 22:03:51.498277 kubelet[2097]: E0212 22:03:51.498210 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:51.958859 env[1633]: time="2024-02-12T22:03:51.958816106Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:51.961521 env[1633]: time="2024-02-12T22:03:51.961487851Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:51.963776 env[1633]: time="2024-02-12T22:03:51.963748371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:51.965638 env[1633]: time="2024-02-12T22:03:51.965614965Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:51.966247 env[1633]: time="2024-02-12T22:03:51.966216760Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 22:03:51.967927 env[1633]: time="2024-02-12T22:03:51.967896604Z" level=info msg="CreateContainer within sandbox \"49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 22:03:51.983068 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2480889024.mount: Deactivated successfully. Feb 12 22:03:51.994348 env[1633]: time="2024-02-12T22:03:51.994233357Z" level=info msg="CreateContainer within sandbox \"49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"35de6620fb09050eac44891be3fe437ecd7e2c2607a16bec34909a4344b5febd\"" Feb 12 22:03:51.995315 env[1633]: time="2024-02-12T22:03:51.995281207Z" level=info msg="StartContainer for \"35de6620fb09050eac44891be3fe437ecd7e2c2607a16bec34909a4344b5febd\"" Feb 12 22:03:52.033262 systemd[1]: Started cri-containerd-35de6620fb09050eac44891be3fe437ecd7e2c2607a16bec34909a4344b5febd.scope. Feb 12 22:03:52.063968 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 12 22:03:52.064125 kernel: audit: type=1400 audit(1707775432.060:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074784 kernel: audit: type=1400 audit(1707775432.060:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.081954 kernel: audit: type=1400 audit(1707775432.060:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.093823 kernel: audit: type=1400 audit(1707775432.060:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.093974 kernel: audit: type=1400 audit(1707775432.060:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.101589 kernel: audit: type=1400 audit(1707775432.060:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.112983 kernel: audit: type=1400 audit(1707775432.060:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.122735 kernel: audit: type=1400 audit(1707775432.060:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.130305 env[1633]: time="2024-02-12T22:03:52.130256742Z" level=info msg="StartContainer for \"35de6620fb09050eac44891be3fe437ecd7e2c2607a16bec34909a4344b5febd\" returns successfully" Feb 12 22:03:52.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.138856 kernel: audit: type=1400 audit(1707775432.060:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.139013 kernel: audit: type=1400 audit(1707775432.063:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.063000 audit: BPF prog-id=114 op=LOAD Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3332 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:52.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335646536363230666230393035306561633434383931626533666534 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3332 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:52.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335646536363230666230393035306561633434383931626533666534 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.068000 audit: BPF prog-id=115 op=LOAD Feb 12 22:03:52.068000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c2090 items=0 ppid=3332 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:52.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335646536363230666230393035306561633434383931626533666534 Feb 12 22:03:52.073000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.073000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.073000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.073000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.073000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.073000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.073000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.073000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.073000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.073000 audit: BPF prog-id=116 op=LOAD Feb 12 22:03:52.073000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c20d8 items=0 ppid=3332 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:52.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335646536363230666230393035306561633434383931626533666534 Feb 12 22:03:52.074000 audit: BPF prog-id=116 op=UNLOAD Feb 12 22:03:52.074000 audit: BPF prog-id=115 op=UNLOAD Feb 12 22:03:52.074000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:52.074000 audit: BPF prog-id=117 op=LOAD Feb 12 22:03:52.074000 audit[3378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c24e8 items=0 ppid=3332 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:52.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335646536363230666230393035306561633434383931626533666534 Feb 12 22:03:52.499189 kubelet[2097]: E0212 22:03:52.499140 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:52.980125 systemd[1]: run-containerd-runc-k8s.io-35de6620fb09050eac44891be3fe437ecd7e2c2607a16bec34909a4344b5febd-runc.tDrlIR.mount: Deactivated successfully. Feb 12 22:03:53.499406 kubelet[2097]: E0212 22:03:53.499357 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:54.500503 kubelet[2097]: E0212 22:03:54.500450 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:55.501076 kubelet[2097]: E0212 22:03:55.501021 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:55.899000 audit[3433]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=3433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:03:55.899000 audit[3433]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc7d2637f0 a2=0 a3=7ffc7d2637dc items=0 ppid=2319 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:55.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:03:55.903000 audit[3433]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=3433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:03:55.903000 audit[3433]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc7d2637f0 a2=0 a3=31030 items=0 ppid=2319 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:55.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:03:55.920727 kubelet[2097]: I0212 22:03:55.920684 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-ml48x" podStartSLOduration=21.132157939 podCreationTimestamp="2024-02-12 22:03:30 +0000 UTC" firstStartedPulling="2024-02-12 22:03:47.178093388 +0000 UTC m=+38.159303969" lastFinishedPulling="2024-02-12 22:03:51.966549475 +0000 UTC m=+42.947760055" observedRunningTime="2024-02-12 22:03:52.808685494 +0000 UTC m=+43.789896092" watchObservedRunningTime="2024-02-12 22:03:55.920614025 +0000 UTC m=+46.901824624" Feb 12 22:03:55.921008 kubelet[2097]: I0212 22:03:55.920990 2097 topology_manager.go:215] "Topology Admit Handler" podUID="ee89295f-9ee2-4ec1-b62c-d4b65fcabb28" podNamespace="default" podName="nfs-server-provisioner-0" Feb 12 22:03:55.928866 systemd[1]: Created slice kubepods-besteffort-podee89295f_9ee2_4ec1_b62c_d4b65fcabb28.slice. Feb 12 22:03:55.929000 audit[3438]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=3438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:03:55.929000 audit[3438]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffce2785d70 a2=0 a3=7ffce2785d5c items=0 ppid=2319 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:55.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:03:55.930000 audit[3438]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=3438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:03:55.930000 audit[3438]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffce2785d70 a2=0 a3=31030 items=0 ppid=2319 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:55.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:03:55.960679 kubelet[2097]: I0212 22:03:55.960641 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-96bxw\" (UniqueName: \"kubernetes.io/projected/ee89295f-9ee2-4ec1-b62c-d4b65fcabb28-kube-api-access-96bxw\") pod \"nfs-server-provisioner-0\" (UID: \"ee89295f-9ee2-4ec1-b62c-d4b65fcabb28\") " pod="default/nfs-server-provisioner-0" Feb 12 22:03:55.960851 kubelet[2097]: I0212 22:03:55.960691 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ee89295f-9ee2-4ec1-b62c-d4b65fcabb28-data\") pod \"nfs-server-provisioner-0\" (UID: \"ee89295f-9ee2-4ec1-b62c-d4b65fcabb28\") " pod="default/nfs-server-provisioner-0" Feb 12 22:03:56.235173 env[1633]: time="2024-02-12T22:03:56.235046437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ee89295f-9ee2-4ec1-b62c-d4b65fcabb28,Namespace:default,Attempt:0,}" Feb 12 22:03:56.432097 (udev-worker)[3435]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:03:56.432570 systemd-networkd[1457]: cali60e51b789ff: Link UP Feb 12 22:03:56.445813 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:03:56.445990 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 22:03:56.446227 systemd-networkd[1457]: cali60e51b789ff: Gained carrier Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.309 [INFO][3441] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.213-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ee89295f-9ee2-4ec1-b62c-d4b65fcabb28 1005 0 2024-02-12 22:03:55 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.19.213 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.213-k8s-nfs--server--provisioner--0-" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.309 [INFO][3441] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.213-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.357 [INFO][3451] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" HandleID="k8s-pod-network.10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Workload="172.31.19.213-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.377 [INFO][3451] ipam_plugin.go 268: Auto assigning IP ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" HandleID="k8s-pod-network.10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Workload="172.31.19.213-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d950), Attrs:map[string]string{"namespace":"default", "node":"172.31.19.213", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 22:03:56.357925152 +0000 UTC"}, Hostname:"172.31.19.213", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.377 [INFO][3451] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.377 [INFO][3451] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.377 [INFO][3451] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.213' Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.380 [INFO][3451] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" host="172.31.19.213" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.386 [INFO][3451] ipam.go 372: Looking up existing affinities for host host="172.31.19.213" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.397 [INFO][3451] ipam.go 489: Trying affinity for 192.168.39.192/26 host="172.31.19.213" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.402 [INFO][3451] ipam.go 155: Attempting to load block cidr=192.168.39.192/26 host="172.31.19.213" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.405 [INFO][3451] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.39.192/26 host="172.31.19.213" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.405 [INFO][3451] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.39.192/26 handle="k8s-pod-network.10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" host="172.31.19.213" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.409 [INFO][3451] ipam.go 1682: Creating new handle: k8s-pod-network.10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.415 [INFO][3451] ipam.go 1203: Writing block in order to claim IPs block=192.168.39.192/26 handle="k8s-pod-network.10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" host="172.31.19.213" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.427 [INFO][3451] ipam.go 1216: Successfully claimed IPs: [192.168.39.195/26] block=192.168.39.192/26 handle="k8s-pod-network.10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" host="172.31.19.213" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.427 [INFO][3451] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.39.195/26] handle="k8s-pod-network.10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" host="172.31.19.213" Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.427 [INFO][3451] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:03:56.476928 env[1633]: 2024-02-12 22:03:56.427 [INFO][3451] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.39.195/26] IPv6=[] ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" HandleID="k8s-pod-network.10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Workload="172.31.19.213-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:03:56.477736 env[1633]: 2024-02-12 22:03:56.429 [INFO][3441] k8s.go 385: Populated endpoint ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.213-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ee89295f-9ee2-4ec1-b62c-d4b65fcabb28", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.39.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:03:56.477736 env[1633]: 2024-02-12 22:03:56.429 [INFO][3441] k8s.go 386: Calico CNI using IPs: [192.168.39.195/32] ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.213-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:03:56.477736 env[1633]: 2024-02-12 22:03:56.429 [INFO][3441] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.213-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:03:56.477736 env[1633]: 2024-02-12 22:03:56.454 [INFO][3441] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.213-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:03:56.478005 env[1633]: 2024-02-12 22:03:56.461 [INFO][3441] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.213-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ee89295f-9ee2-4ec1-b62c-d4b65fcabb28", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.39.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"92:4c:1a:52:7c:df", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:03:56.478005 env[1633]: 2024-02-12 22:03:56.475 [INFO][3441] k8s.go 491: Wrote updated endpoint to datastore ContainerID="10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.213-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:03:56.505566 kubelet[2097]: E0212 22:03:56.501789 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:56.507000 audit[3477]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=3477 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:03:56.507000 audit[3477]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7fffb1343c70 a2=0 a3=7fffb1343c5c items=0 ppid=2787 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:56.507000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:03:56.514062 env[1633]: time="2024-02-12T22:03:56.513966725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:03:56.514062 env[1633]: time="2024-02-12T22:03:56.514008564Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:03:56.514062 env[1633]: time="2024-02-12T22:03:56.514039519Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:03:56.514692 env[1633]: time="2024-02-12T22:03:56.514518890Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b pid=3483 runtime=io.containerd.runc.v2 Feb 12 22:03:56.548445 systemd[1]: Started cri-containerd-10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b.scope. Feb 12 22:03:56.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.566000 audit: BPF prog-id=118 op=LOAD Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3483 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:56.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613835643464336237336234626139326139326334376335646361 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3483 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:56.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613835643464336237336234626139326139326334376335646361 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.567000 audit: BPF prog-id=119 op=LOAD Feb 12 22:03:56.567000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001be090 items=0 ppid=3483 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:56.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613835643464336237336234626139326139326334376335646361 Feb 12 22:03:56.568000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.568000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.568000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.568000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.568000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.568000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.568000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.568000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.568000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.568000 audit: BPF prog-id=120 op=LOAD Feb 12 22:03:56.568000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001be0d8 items=0 ppid=3483 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:56.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613835643464336237336234626139326139326334376335646361 Feb 12 22:03:56.569000 audit: BPF prog-id=120 op=UNLOAD Feb 12 22:03:56.569000 audit: BPF prog-id=119 op=UNLOAD Feb 12 22:03:56.569000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.569000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.569000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.569000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.569000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.569000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.569000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.569000 audit[3492]: AVC avc: denied { perfmon } for pid=3492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.569000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.569000 audit[3492]: AVC avc: denied { bpf } for pid=3492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:56.569000 audit: BPF prog-id=121 op=LOAD Feb 12 22:03:56.569000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001be4e8 items=0 ppid=3483 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:56.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613835643464336237336234626139326139326334376335646361 Feb 12 22:03:56.604150 env[1633]: time="2024-02-12T22:03:56.604105302Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ee89295f-9ee2-4ec1-b62c-d4b65fcabb28,Namespace:default,Attempt:0,} returns sandbox id \"10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b\"" Feb 12 22:03:56.606711 env[1633]: time="2024-02-12T22:03:56.606446214Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 22:03:57.104539 systemd[1]: run-containerd-runc-k8s.io-10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b-runc.WuocYl.mount: Deactivated successfully. Feb 12 22:03:57.503563 kubelet[2097]: E0212 22:03:57.503420 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:58.335048 systemd-networkd[1457]: cali60e51b789ff: Gained IPv6LL Feb 12 22:03:58.503981 kubelet[2097]: E0212 22:03:58.503930 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:03:59.504490 kubelet[2097]: E0212 22:03:59.504413 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:00.247822 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3144865950.mount: Deactivated successfully. Feb 12 22:04:00.509979 kubelet[2097]: E0212 22:04:00.508929 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:01.509859 kubelet[2097]: E0212 22:04:01.509810 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:02.510953 kubelet[2097]: E0212 22:04:02.510864 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:03.346766 systemd[1]: run-containerd-runc-k8s.io-5a3e258c01093571d8d55031e235a9e63caeb960c19b7a2eaa1e01d93d36ab9c-runc.RcktRb.mount: Deactivated successfully. Feb 12 22:04:03.394427 env[1633]: time="2024-02-12T22:04:03.394378694Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:03.397539 env[1633]: time="2024-02-12T22:04:03.397492046Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:03.401666 env[1633]: time="2024-02-12T22:04:03.401623510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:03.406025 env[1633]: time="2024-02-12T22:04:03.405970666Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:03.410930 env[1633]: time="2024-02-12T22:04:03.410787969Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 12 22:04:03.415195 env[1633]: time="2024-02-12T22:04:03.415153168Z" level=info msg="CreateContainer within sandbox \"10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 22:04:03.431256 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2478060305.mount: Deactivated successfully. Feb 12 22:04:03.443822 env[1633]: time="2024-02-12T22:04:03.443769924Z" level=info msg="CreateContainer within sandbox \"10a85d4d3b73b4ba92a92c47c5dca41b63132b395b434b3befa11a233573bf5b\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"d783c6004964a28622b2d0a395c396e6220e050de95815d72847451cee49f4f3\"" Feb 12 22:04:03.445255 env[1633]: time="2024-02-12T22:04:03.445221992Z" level=info msg="StartContainer for \"d783c6004964a28622b2d0a395c396e6220e050de95815d72847451cee49f4f3\"" Feb 12 22:04:03.474793 systemd[1]: Started cri-containerd-d783c6004964a28622b2d0a395c396e6220e050de95815d72847451cee49f4f3.scope. Feb 12 22:04:03.497075 kernel: kauditd_printk_skb: 119 callbacks suppressed Feb 12 22:04:03.497224 kernel: audit: type=1400 audit(1707775443.494:859): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.502975 kernel: audit: type=1400 audit(1707775443.494:860): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.514795 kubelet[2097]: E0212 22:04:03.514208 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:03.520317 kernel: audit: type=1400 audit(1707775443.494:861): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.520431 kernel: audit: type=1400 audit(1707775443.494:862): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.528392 kernel: audit: type=1400 audit(1707775443.494:863): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.536109 kernel: audit: type=1400 audit(1707775443.494:864): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.547976 kernel: audit: type=1400 audit(1707775443.494:865): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.560954 env[1633]: time="2024-02-12T22:04:03.560829276Z" level=info msg="StartContainer for \"d783c6004964a28622b2d0a395c396e6220e050de95815d72847451cee49f4f3\" returns successfully" Feb 12 22:04:03.566830 kernel: audit: type=1400 audit(1707775443.494:866): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.566968 kernel: audit: type=1400 audit(1707775443.494:867): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.496000 audit: BPF prog-id=122 op=LOAD Feb 12 22:04:03.573980 kernel: audit: type=1400 audit(1707775443.496:868): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.501000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.501000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3483 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383363363030343936346132383632326232643061333935633339 Feb 12 22:04:03.501000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.501000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3483 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383363363030343936346132383632326232643061333935633339 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit: BPF prog-id=123 op=LOAD Feb 12 22:04:03.507000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099360 items=0 ppid=3483 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383363363030343936346132383632326232643061333935633339 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit: BPF prog-id=124 op=LOAD Feb 12 22:04:03.507000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000993a8 items=0 ppid=3483 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383363363030343936346132383632326232643061333935633339 Feb 12 22:04:03.507000 audit: BPF prog-id=124 op=UNLOAD Feb 12 22:04:03.507000 audit: BPF prog-id=123 op=UNLOAD Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.507000 audit: BPF prog-id=125 op=LOAD Feb 12 22:04:03.507000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000997b8 items=0 ppid=3483 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437383363363030343936346132383632326232643061333935633339 Feb 12 22:04:03.620000 audit[3574]: AVC avc: denied { search } for pid=3574 comm="rpcbind" name="crypto" dev="proc" ino=23798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c386 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 22:04:03.620000 audit[3574]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb5e97420c0 a2=0 a3=0 items=0 ppid=3558 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c386 key=(null) Feb 12 22:04:03.620000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 22:04:03.667000 audit[3579]: AVC avc: denied { search } for pid=3579 comm="dbus-daemon" name="crypto" dev="proc" ino=23798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c386 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 22:04:03.667000 audit[3579]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fd6715240c0 a2=0 a3=0 items=0 ppid=3558 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c386 key=(null) Feb 12 22:04:03.667000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 22:04:03.671000 audit[3580]: AVC avc: denied { watch } for pid=3580 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c386 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c205,c386 tclass=dir permissive=0 Feb 12 22:04:03.671000 audit[3580]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56462809a7e0 a2=2c8 a3=7ffe2ca4288c items=0 ppid=3558 pid=3580 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c386 key=(null) Feb 12 22:04:03.671000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 22:04:03.676000 audit[3581]: AVC avc: denied { read } for pid=3581 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23421 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c386 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 22:04:03.676000 audit[3581]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f622868c320 a1=80000 a2=d a3=7ffc467d8790 items=0 ppid=3558 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c386 key=(null) Feb 12 22:04:03.676000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 22:04:03.677000 audit[3581]: AVC avc: denied { search } for pid=3581 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c386 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 22:04:03.677000 audit[3581]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f6227be00c0 a2=0 a3=0 items=0 ppid=3558 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c386 key=(null) Feb 12 22:04:03.677000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 22:04:03.858993 kubelet[2097]: I0212 22:04:03.858755 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.053122976 podCreationTimestamp="2024-02-12 22:03:55 +0000 UTC" firstStartedPulling="2024-02-12 22:03:56.606131498 +0000 UTC m=+47.587342077" lastFinishedPulling="2024-02-12 22:04:03.411491052 +0000 UTC m=+54.392701634" observedRunningTime="2024-02-12 22:04:03.858095228 +0000 UTC m=+54.839305828" watchObservedRunningTime="2024-02-12 22:04:03.858482533 +0000 UTC m=+54.839693126" Feb 12 22:04:03.898000 audit[3586]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3586 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:03.898000 audit[3586]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff17277c10 a2=0 a3=7fff17277bfc items=0 ppid=2319 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:03.907000 audit[3586]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=3586 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:03.907000 audit[3586]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7fff17277c10 a2=0 a3=7fff17277bfc items=0 ppid=2319 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.907000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:04.515138 kubelet[2097]: E0212 22:04:04.515083 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:05.516209 kubelet[2097]: E0212 22:04:05.516136 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:06.517087 kubelet[2097]: E0212 22:04:06.517038 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:07.518026 kubelet[2097]: E0212 22:04:07.517973 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:08.519008 kubelet[2097]: E0212 22:04:08.518956 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:09.466446 kubelet[2097]: E0212 22:04:09.466349 2097 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:09.501661 env[1633]: time="2024-02-12T22:04:09.501609822Z" level=info msg="StopPodSandbox for \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\"" Feb 12 22:04:09.519450 kubelet[2097]: E0212 22:04:09.519390 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.569 [WARNING][3605] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-csi--node--driver--n89zm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b30a48af-9704-4de7-a0d9-09e574ab0cd7", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe", Pod:"csi-node-driver-n89zm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.39.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie4610eb320f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.570 [INFO][3605] k8s.go 578: Cleaning up netns ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.570 [INFO][3605] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" iface="eth0" netns="" Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.570 [INFO][3605] k8s.go 585: Releasing IP address(es) ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.570 [INFO][3605] utils.go 188: Calico CNI releasing IP address ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.609 [INFO][3611] ipam_plugin.go 415: Releasing address using handleID ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" HandleID="k8s-pod-network.606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.609 [INFO][3611] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.609 [INFO][3611] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.620 [WARNING][3611] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" HandleID="k8s-pod-network.606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.621 [INFO][3611] ipam_plugin.go 443: Releasing address using workloadID ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" HandleID="k8s-pod-network.606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.624 [INFO][3611] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:04:09.626684 env[1633]: 2024-02-12 22:04:09.625 [INFO][3605] k8s.go 591: Teardown processing complete. ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:04:09.627575 env[1633]: time="2024-02-12T22:04:09.626730198Z" level=info msg="TearDown network for sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\" successfully" Feb 12 22:04:09.627575 env[1633]: time="2024-02-12T22:04:09.626764820Z" level=info msg="StopPodSandbox for \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\" returns successfully" Feb 12 22:04:09.627721 env[1633]: time="2024-02-12T22:04:09.627673033Z" level=info msg="RemovePodSandbox for \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\"" Feb 12 22:04:09.627788 env[1633]: time="2024-02-12T22:04:09.627719588Z" level=info msg="Forcibly stopping sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\"" Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.696 [WARNING][3629] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-csi--node--driver--n89zm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b30a48af-9704-4de7-a0d9-09e574ab0cd7", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"550b43c3c637756af13765d2f166ba8247ba52b8802806a866071c93201e76fe", Pod:"csi-node-driver-n89zm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.39.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie4610eb320f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.697 [INFO][3629] k8s.go 578: Cleaning up netns ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.697 [INFO][3629] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" iface="eth0" netns="" Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.697 [INFO][3629] k8s.go 585: Releasing IP address(es) ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.697 [INFO][3629] utils.go 188: Calico CNI releasing IP address ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.738 [INFO][3637] ipam_plugin.go 415: Releasing address using handleID ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" HandleID="k8s-pod-network.606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.738 [INFO][3637] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.738 [INFO][3637] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.751 [WARNING][3637] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" HandleID="k8s-pod-network.606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.751 [INFO][3637] ipam_plugin.go 443: Releasing address using workloadID ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" HandleID="k8s-pod-network.606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Workload="172.31.19.213-k8s-csi--node--driver--n89zm-eth0" Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.753 [INFO][3637] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:04:09.757893 env[1633]: 2024-02-12 22:04:09.755 [INFO][3629] k8s.go 591: Teardown processing complete. ContainerID="606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366" Feb 12 22:04:09.757893 env[1633]: time="2024-02-12T22:04:09.757007676Z" level=info msg="TearDown network for sandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\" successfully" Feb 12 22:04:09.761995 env[1633]: time="2024-02-12T22:04:09.761934746Z" level=info msg="RemovePodSandbox \"606cddbc05da26d1a12adddb4fa031fd70f08b83194820260552f9ee57d0a366\" returns successfully" Feb 12 22:04:09.762823 env[1633]: time="2024-02-12T22:04:09.762783514Z" level=info msg="StopPodSandbox for \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\"" Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.829 [WARNING][3656] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"60f3fc8f-9bef-428b-802f-1f4626c92d4d", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b", Pod:"nginx-deployment-6d5f899847-ml48x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.39.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali595efe8081c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.829 [INFO][3656] k8s.go 578: Cleaning up netns ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.829 [INFO][3656] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" iface="eth0" netns="" Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.829 [INFO][3656] k8s.go 585: Releasing IP address(es) ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.830 [INFO][3656] utils.go 188: Calico CNI releasing IP address ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.859 [INFO][3663] ipam_plugin.go 415: Releasing address using handleID ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" HandleID="k8s-pod-network.7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.859 [INFO][3663] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.859 [INFO][3663] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.871 [WARNING][3663] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" HandleID="k8s-pod-network.7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.871 [INFO][3663] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" HandleID="k8s-pod-network.7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.875 [INFO][3663] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:04:09.879114 env[1633]: 2024-02-12 22:04:09.877 [INFO][3656] k8s.go 591: Teardown processing complete. ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:04:09.879911 env[1633]: time="2024-02-12T22:04:09.879846204Z" level=info msg="TearDown network for sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\" successfully" Feb 12 22:04:09.880011 env[1633]: time="2024-02-12T22:04:09.879995443Z" level=info msg="StopPodSandbox for \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\" returns successfully" Feb 12 22:04:09.880921 env[1633]: time="2024-02-12T22:04:09.880868927Z" level=info msg="RemovePodSandbox for \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\"" Feb 12 22:04:09.881073 env[1633]: time="2024-02-12T22:04:09.880926124Z" level=info msg="Forcibly stopping sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\"" Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.933 [WARNING][3681] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"60f3fc8f-9bef-428b-802f-1f4626c92d4d", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"49fade7e435c28933e8b18205b05073fc76d0b67a8bdbf0d6470dedde0c2cf5b", Pod:"nginx-deployment-6d5f899847-ml48x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.39.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali595efe8081c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.934 [INFO][3681] k8s.go 578: Cleaning up netns ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.934 [INFO][3681] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" iface="eth0" netns="" Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.934 [INFO][3681] k8s.go 585: Releasing IP address(es) ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.934 [INFO][3681] utils.go 188: Calico CNI releasing IP address ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.962 [INFO][3687] ipam_plugin.go 415: Releasing address using handleID ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" HandleID="k8s-pod-network.7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.962 [INFO][3687] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.962 [INFO][3687] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.975 [WARNING][3687] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" HandleID="k8s-pod-network.7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.975 [INFO][3687] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" HandleID="k8s-pod-network.7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Workload="172.31.19.213-k8s-nginx--deployment--6d5f899847--ml48x-eth0" Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.978 [INFO][3687] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:04:09.980906 env[1633]: 2024-02-12 22:04:09.979 [INFO][3681] k8s.go 591: Teardown processing complete. ContainerID="7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f" Feb 12 22:04:09.981762 env[1633]: time="2024-02-12T22:04:09.981716127Z" level=info msg="TearDown network for sandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\" successfully" Feb 12 22:04:09.986189 env[1633]: time="2024-02-12T22:04:09.986147884Z" level=info msg="RemovePodSandbox \"7a3352742dd4caa84a99b7aa6dfa28cb0a59bd84536247f6660705c7eff7b29f\" returns successfully" Feb 12 22:04:10.179000 audit[3695]: NETFILTER_CFG table=filter:78 family=2 entries=9 op=nft_register_rule pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:10.182684 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 22:04:10.182812 kernel: audit: type=1325 audit(1707775450.179:884): table=filter:78 family=2 entries=9 op=nft_register_rule pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:10.179000 audit[3695]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc9fe22f60 a2=0 a3=7ffc9fe22f4c items=0 ppid=2319 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:10.195997 kernel: audit: type=1300 audit(1707775450.179:884): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc9fe22f60 a2=0 a3=7ffc9fe22f4c items=0 ppid=2319 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:10.196232 kernel: audit: type=1327 audit(1707775450.179:884): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:10.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:10.183000 audit[3695]: NETFILTER_CFG table=nat:79 family=2 entries=44 op=nft_register_rule pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:10.183000 audit[3695]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc9fe22f60 a2=0 a3=7ffc9fe22f4c items=0 ppid=2319 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:10.208358 kubelet[2097]: I0212 22:04:10.206503 2097 topology_manager.go:215] "Topology Admit Handler" podUID="4a1dc194-161a-414f-9987-897a0d38a578" podNamespace="calico-apiserver" podName="calico-apiserver-7fbbf5f59b-xpwhv" Feb 12 22:04:10.215758 kernel: audit: type=1325 audit(1707775450.183:885): table=nat:79 family=2 entries=44 op=nft_register_rule pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:10.215862 kernel: audit: type=1300 audit(1707775450.183:885): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc9fe22f60 a2=0 a3=7ffc9fe22f4c items=0 ppid=2319 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:10.216510 kernel: audit: type=1327 audit(1707775450.183:885): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:10.183000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:10.215562 systemd[1]: Created slice kubepods-besteffort-pod4a1dc194_161a_414f_9987_897a0d38a578.slice. Feb 12 22:04:10.227210 kubelet[2097]: W0212 22:04:10.227178 2097 reflector.go:535] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:172.31.19.213" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node '172.31.19.213' and this object Feb 12 22:04:10.227613 kubelet[2097]: W0212 22:04:10.227468 2097 reflector.go:535] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.19.213" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node '172.31.19.213' and this object Feb 12 22:04:10.227717 kubelet[2097]: E0212 22:04:10.227626 2097 reflector.go:147] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:172.31.19.213" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node '172.31.19.213' and this object Feb 12 22:04:10.227811 kubelet[2097]: E0212 22:04:10.227796 2097 reflector.go:147] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:172.31.19.213" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node '172.31.19.213' and this object Feb 12 22:04:10.232000 audit[3697]: NETFILTER_CFG table=filter:80 family=2 entries=10 op=nft_register_rule pid=3697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:10.232000 audit[3697]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc731518b0 a2=0 a3=7ffc7315189c items=0 ppid=2319 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:10.247987 kernel: audit: type=1325 audit(1707775450.232:886): table=filter:80 family=2 entries=10 op=nft_register_rule pid=3697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:10.248143 kernel: audit: type=1300 audit(1707775450.232:886): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc731518b0 a2=0 a3=7ffc7315189c items=0 ppid=2319 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:10.248193 kernel: audit: type=1327 audit(1707775450.232:886): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:10.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:10.232000 audit[3697]: NETFILTER_CFG table=nat:81 family=2 entries=44 op=nft_register_rule pid=3697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:10.232000 audit[3697]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc731518b0 a2=0 a3=7ffc7315189c items=0 ppid=2319 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:10.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:10.257984 kernel: audit: type=1325 audit(1707775450.232:887): table=nat:81 family=2 entries=44 op=nft_register_rule pid=3697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:10.262714 kubelet[2097]: I0212 22:04:10.262680 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4a1dc194-161a-414f-9987-897a0d38a578-calico-apiserver-certs\") pod \"calico-apiserver-7fbbf5f59b-xpwhv\" (UID: \"4a1dc194-161a-414f-9987-897a0d38a578\") " pod="calico-apiserver/calico-apiserver-7fbbf5f59b-xpwhv" Feb 12 22:04:10.262853 kubelet[2097]: I0212 22:04:10.262736 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rgd58\" (UniqueName: \"kubernetes.io/projected/4a1dc194-161a-414f-9987-897a0d38a578-kube-api-access-rgd58\") pod \"calico-apiserver-7fbbf5f59b-xpwhv\" (UID: \"4a1dc194-161a-414f-9987-897a0d38a578\") " pod="calico-apiserver/calico-apiserver-7fbbf5f59b-xpwhv" Feb 12 22:04:10.520512 kubelet[2097]: E0212 22:04:10.520391 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:11.399805 kubelet[2097]: E0212 22:04:11.399744 2097 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 12 22:04:11.400594 kubelet[2097]: E0212 22:04:11.400556 2097 projected.go:198] Error preparing data for projected volume kube-api-access-rgd58 for pod calico-apiserver/calico-apiserver-7fbbf5f59b-xpwhv: failed to sync configmap cache: timed out waiting for the condition Feb 12 22:04:11.400728 kubelet[2097]: E0212 22:04:11.400692 2097 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/4a1dc194-161a-414f-9987-897a0d38a578-kube-api-access-rgd58 podName:4a1dc194-161a-414f-9987-897a0d38a578 nodeName:}" failed. No retries permitted until 2024-02-12 22:04:11.900648588 +0000 UTC m=+62.881859183 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-rgd58" (UniqueName: "kubernetes.io/projected/4a1dc194-161a-414f-9987-897a0d38a578-kube-api-access-rgd58") pod "calico-apiserver-7fbbf5f59b-xpwhv" (UID: "4a1dc194-161a-414f-9987-897a0d38a578") : failed to sync configmap cache: timed out waiting for the condition Feb 12 22:04:11.521019 kubelet[2097]: E0212 22:04:11.520966 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:12.025834 env[1633]: time="2024-02-12T22:04:12.025785435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fbbf5f59b-xpwhv,Uid:4a1dc194-161a-414f-9987-897a0d38a578,Namespace:calico-apiserver,Attempt:0,}" Feb 12 22:04:12.297318 systemd-networkd[1457]: calia66473109dd: Link UP Feb 12 22:04:12.303557 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:04:12.303695 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia66473109dd: link becomes ready Feb 12 22:04:12.304051 systemd-networkd[1457]: calia66473109dd: Gained carrier Feb 12 22:04:12.305771 (udev-worker)[3720]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.130 [INFO][3701] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0 calico-apiserver-7fbbf5f59b- calico-apiserver 4a1dc194-161a-414f-9987-897a0d38a578 1101 0 2024-02-12 22:04:10 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7fbbf5f59b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.19.213 calico-apiserver-7fbbf5f59b-xpwhv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia66473109dd [] []}} ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Namespace="calico-apiserver" Pod="calico-apiserver-7fbbf5f59b-xpwhv" WorkloadEndpoint="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.131 [INFO][3701] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Namespace="calico-apiserver" Pod="calico-apiserver-7fbbf5f59b-xpwhv" WorkloadEndpoint="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.176 [INFO][3712] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" HandleID="k8s-pod-network.1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Workload="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.216 [INFO][3712] ipam_plugin.go 268: Auto assigning IP ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" HandleID="k8s-pod-network.1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Workload="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.19.213", "pod":"calico-apiserver-7fbbf5f59b-xpwhv", "timestamp":"2024-02-12 22:04:12.176023234 +0000 UTC"}, Hostname:"172.31.19.213", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.216 [INFO][3712] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.216 [INFO][3712] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.216 [INFO][3712] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.213' Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.227 [INFO][3712] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" host="172.31.19.213" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.244 [INFO][3712] ipam.go 372: Looking up existing affinities for host host="172.31.19.213" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.252 [INFO][3712] ipam.go 489: Trying affinity for 192.168.39.192/26 host="172.31.19.213" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.255 [INFO][3712] ipam.go 155: Attempting to load block cidr=192.168.39.192/26 host="172.31.19.213" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.260 [INFO][3712] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.39.192/26 host="172.31.19.213" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.260 [INFO][3712] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.39.192/26 handle="k8s-pod-network.1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" host="172.31.19.213" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.268 [INFO][3712] ipam.go 1682: Creating new handle: k8s-pod-network.1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052 Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.275 [INFO][3712] ipam.go 1203: Writing block in order to claim IPs block=192.168.39.192/26 handle="k8s-pod-network.1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" host="172.31.19.213" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.288 [INFO][3712] ipam.go 1216: Successfully claimed IPs: [192.168.39.196/26] block=192.168.39.192/26 handle="k8s-pod-network.1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" host="172.31.19.213" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.288 [INFO][3712] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.39.196/26] handle="k8s-pod-network.1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" host="172.31.19.213" Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.289 [INFO][3712] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:04:12.327539 env[1633]: 2024-02-12 22:04:12.289 [INFO][3712] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.39.196/26] IPv6=[] ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" HandleID="k8s-pod-network.1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Workload="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0" Feb 12 22:04:12.328616 env[1633]: 2024-02-12 22:04:12.290 [INFO][3701] k8s.go 385: Populated endpoint ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Namespace="calico-apiserver" Pod="calico-apiserver-7fbbf5f59b-xpwhv" WorkloadEndpoint="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0", GenerateName:"calico-apiserver-7fbbf5f59b-", Namespace:"calico-apiserver", SelfLink:"", UID:"4a1dc194-161a-414f-9987-897a0d38a578", ResourceVersion:"1101", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 4, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fbbf5f59b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"", Pod:"calico-apiserver-7fbbf5f59b-xpwhv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.39.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia66473109dd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:04:12.328616 env[1633]: 2024-02-12 22:04:12.291 [INFO][3701] k8s.go 386: Calico CNI using IPs: [192.168.39.196/32] ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Namespace="calico-apiserver" Pod="calico-apiserver-7fbbf5f59b-xpwhv" WorkloadEndpoint="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0" Feb 12 22:04:12.328616 env[1633]: 2024-02-12 22:04:12.291 [INFO][3701] dataplane_linux.go 68: Setting the host side veth name to calia66473109dd ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Namespace="calico-apiserver" Pod="calico-apiserver-7fbbf5f59b-xpwhv" WorkloadEndpoint="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0" Feb 12 22:04:12.328616 env[1633]: 2024-02-12 22:04:12.304 [INFO][3701] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Namespace="calico-apiserver" Pod="calico-apiserver-7fbbf5f59b-xpwhv" WorkloadEndpoint="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0" Feb 12 22:04:12.328616 env[1633]: 2024-02-12 22:04:12.305 [INFO][3701] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Namespace="calico-apiserver" Pod="calico-apiserver-7fbbf5f59b-xpwhv" WorkloadEndpoint="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0", GenerateName:"calico-apiserver-7fbbf5f59b-", Namespace:"calico-apiserver", SelfLink:"", UID:"4a1dc194-161a-414f-9987-897a0d38a578", ResourceVersion:"1101", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 4, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fbbf5f59b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052", Pod:"calico-apiserver-7fbbf5f59b-xpwhv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.39.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia66473109dd", MAC:"0a:0e:d0:5c:24:85", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:04:12.328616 env[1633]: 2024-02-12 22:04:12.325 [INFO][3701] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052" Namespace="calico-apiserver" Pod="calico-apiserver-7fbbf5f59b-xpwhv" WorkloadEndpoint="172.31.19.213-k8s-calico--apiserver--7fbbf5f59b--xpwhv-eth0" Feb 12 22:04:12.355673 env[1633]: time="2024-02-12T22:04:12.351453693Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:04:12.355673 env[1633]: time="2024-02-12T22:04:12.351507207Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:04:12.355673 env[1633]: time="2024-02-12T22:04:12.351524282Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:04:12.355673 env[1633]: time="2024-02-12T22:04:12.353865019Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052 pid=3739 runtime=io.containerd.runc.v2 Feb 12 22:04:12.389511 systemd[1]: Started cri-containerd-1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052.scope. Feb 12 22:04:12.404231 systemd[1]: run-containerd-runc-k8s.io-1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052-runc.4MmC17.mount: Deactivated successfully. Feb 12 22:04:12.412000 audit[3762]: NETFILTER_CFG table=filter:82 family=2 entries=55 op=nft_register_chain pid=3762 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:04:12.412000 audit[3762]: SYSCALL arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7ffe77738160 a2=0 a3=7ffe7773814c items=0 ppid=2787 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:12.412000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:04:12.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit: BPF prog-id=126 op=LOAD Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:12.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313531366637636563613366633764633562333339343564323533 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:12.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313531366637636563613366633764633562333339343564323533 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit: BPF prog-id=127 op=LOAD Feb 12 22:04:12.433000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032dd10 items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:12.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313531366637636563613366633764633562333339343564323533 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.433000 audit: BPF prog-id=128 op=LOAD Feb 12 22:04:12.433000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032dd58 items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:12.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313531366637636563613366633764633562333339343564323533 Feb 12 22:04:12.433000 audit: BPF prog-id=128 op=UNLOAD Feb 12 22:04:12.433000 audit: BPF prog-id=127 op=UNLOAD Feb 12 22:04:12.434000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.434000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.434000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.434000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.434000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.434000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.434000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.434000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.434000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.434000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:12.434000 audit: BPF prog-id=129 op=LOAD Feb 12 22:04:12.434000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b0168 items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:12.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313531366637636563613366633764633562333339343564323533 Feb 12 22:04:12.474944 env[1633]: time="2024-02-12T22:04:12.474905161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fbbf5f59b-xpwhv,Uid:4a1dc194-161a-414f-9987-897a0d38a578,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052\"" Feb 12 22:04:12.477314 env[1633]: time="2024-02-12T22:04:12.477286644Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 22:04:12.522020 kubelet[2097]: E0212 22:04:12.521970 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:13.523170 kubelet[2097]: E0212 22:04:13.523129 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:13.680999 systemd-networkd[1457]: calia66473109dd: Gained IPv6LL Feb 12 22:04:14.524041 kubelet[2097]: E0212 22:04:14.523978 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:15.524885 kubelet[2097]: E0212 22:04:15.524761 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:16.525188 kubelet[2097]: E0212 22:04:16.525136 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:17.526321 kubelet[2097]: E0212 22:04:17.526261 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:17.531934 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 22:04:17.532109 kernel: audit: type=1325 audit(1707775457.528:907): table=filter:83 family=2 entries=10 op=nft_register_rule pid=3939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:17.528000 audit[3939]: NETFILTER_CFG table=filter:83 family=2 entries=10 op=nft_register_rule pid=3939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:17.528000 audit[3939]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc465afd10 a2=0 a3=7ffc465afcfc items=0 ppid=2319 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:17.546908 kernel: audit: type=1300 audit(1707775457.528:907): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc465afd10 a2=0 a3=7ffc465afcfc items=0 ppid=2319 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:17.528000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:17.546000 audit[3939]: NETFILTER_CFG table=nat:84 family=2 entries=44 op=nft_register_rule pid=3939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:17.559231 kernel: audit: type=1327 audit(1707775457.528:907): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:17.559340 kernel: audit: type=1325 audit(1707775457.546:908): table=nat:84 family=2 entries=44 op=nft_register_rule pid=3939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:17.546000 audit[3939]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc465afd10 a2=0 a3=7ffc465afcfc items=0 ppid=2319 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:17.569084 kernel: audit: type=1300 audit(1707775457.546:908): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc465afd10 a2=0 a3=7ffc465afcfc items=0 ppid=2319 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:17.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:17.573638 kernel: audit: type=1327 audit(1707775457.546:908): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:17.922588 env[1633]: time="2024-02-12T22:04:17.922531409Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:17.924014 env[1633]: time="2024-02-12T22:04:17.923973554Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:17.924894 env[1633]: time="2024-02-12T22:04:17.924851005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:17.927462 env[1633]: time="2024-02-12T22:04:17.927430140Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:17.928314 env[1633]: time="2024-02-12T22:04:17.928280226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 22:04:17.930671 env[1633]: time="2024-02-12T22:04:17.930619024Z" level=info msg="CreateContainer within sandbox \"1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 22:04:17.950054 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1746932115.mount: Deactivated successfully. Feb 12 22:04:17.960520 env[1633]: time="2024-02-12T22:04:17.960464669Z" level=info msg="CreateContainer within sandbox \"1a1516f7ceca3fc7dc5b33945d2536d4cabe7cf9dd0ac12e5f0ff6d66a3bc052\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7551397325ba004ccc733043ae0feeb4e1f4372ed9187c9eace650f2dbc816fc\"" Feb 12 22:04:17.961473 env[1633]: time="2024-02-12T22:04:17.961436756Z" level=info msg="StartContainer for \"7551397325ba004ccc733043ae0feeb4e1f4372ed9187c9eace650f2dbc816fc\"" Feb 12 22:04:17.999061 systemd[1]: Started cri-containerd-7551397325ba004ccc733043ae0feeb4e1f4372ed9187c9eace650f2dbc816fc.scope. Feb 12 22:04:18.009773 systemd[1]: run-containerd-runc-k8s.io-7551397325ba004ccc733043ae0feeb4e1f4372ed9187c9eace650f2dbc816fc-runc.r92lXn.mount: Deactivated successfully. Feb 12 22:04:18.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.049480 kernel: audit: type=1400 audit(1707775458.036:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.049636 kernel: audit: type=1400 audit(1707775458.036:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.049697 kernel: audit: type=1400 audit(1707775458.036:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.064682 kernel: audit: type=1400 audit(1707775458.036:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit: BPF prog-id=130 op=LOAD Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3739 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:18.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353133393733323562613030346363633733333034336165306665 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3739 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:18.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353133393733323562613030346363633733333034336165306665 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.036000 audit: BPF prog-id=131 op=LOAD Feb 12 22:04:18.036000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024a60 items=0 ppid=3739 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:18.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353133393733323562613030346363633733333034336165306665 Feb 12 22:04:18.048000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.048000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.048000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.048000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.048000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.048000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.048000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.048000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.048000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.048000 audit: BPF prog-id=132 op=LOAD Feb 12 22:04:18.048000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024aa8 items=0 ppid=3739 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:18.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353133393733323562613030346363633733333034336165306665 Feb 12 22:04:18.054000 audit: BPF prog-id=132 op=UNLOAD Feb 12 22:04:18.054000 audit: BPF prog-id=131 op=UNLOAD Feb 12 22:04:18.055000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.055000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.055000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.055000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.055000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.055000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.055000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.055000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.055000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.055000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:18.055000 audit: BPF prog-id=133 op=LOAD Feb 12 22:04:18.055000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024eb8 items=0 ppid=3739 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:18.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353133393733323562613030346363633733333034336165306665 Feb 12 22:04:18.108898 env[1633]: time="2024-02-12T22:04:18.102987356Z" level=info msg="StartContainer for \"7551397325ba004ccc733043ae0feeb4e1f4372ed9187c9eace650f2dbc816fc\" returns successfully" Feb 12 22:04:18.527308 kubelet[2097]: E0212 22:04:18.527270 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:18.881000 audit[3960]: AVC avc: denied { watch } for pid=3960 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_04_11.1352617034/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c128,c720 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c128,c720 tclass=file permissive=0 Feb 12 22:04:18.881000 audit[3960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000059e40 a2=fc6 a3=0 items=0 ppid=3739 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c128,c720 key=(null) Feb 12 22:04:18.881000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:04:18.930000 audit[3982]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=3982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:18.930000 audit[3982]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffca1eef500 a2=0 a3=7ffca1eef4ec items=0 ppid=2319 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:18.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:18.932000 audit[3982]: NETFILTER_CFG table=nat:86 family=2 entries=44 op=nft_register_rule pid=3982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:04:18.932000 audit[3982]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffca1eef500 a2=0 a3=7ffca1eef4ec items=0 ppid=2319 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:18.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:04:19.528236 kubelet[2097]: E0212 22:04:19.528187 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:20.529416 kubelet[2097]: E0212 22:04:20.529360 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:21.529649 kubelet[2097]: E0212 22:04:21.529600 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:22.530740 kubelet[2097]: E0212 22:04:22.530685 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:23.531500 kubelet[2097]: E0212 22:04:23.531447 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:24.532371 kubelet[2097]: E0212 22:04:24.532317 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:25.533011 kubelet[2097]: E0212 22:04:25.532966 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:26.534646 kubelet[2097]: E0212 22:04:26.534596 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:27.535005 kubelet[2097]: E0212 22:04:27.534952 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:28.224764 kubelet[2097]: I0212 22:04:28.224718 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7fbbf5f59b-xpwhv" podStartSLOduration=12.773005856 podCreationTimestamp="2024-02-12 22:04:10 +0000 UTC" firstStartedPulling="2024-02-12 22:04:12.476899375 +0000 UTC m=+63.458109964" lastFinishedPulling="2024-02-12 22:04:17.928575416 +0000 UTC m=+68.909785992" observedRunningTime="2024-02-12 22:04:18.90947449 +0000 UTC m=+69.890685085" watchObservedRunningTime="2024-02-12 22:04:28.224681884 +0000 UTC m=+79.205892479" Feb 12 22:04:28.225034 kubelet[2097]: I0212 22:04:28.225005 2097 topology_manager.go:215] "Topology Admit Handler" podUID="f1f686c5-9a26-42ca-b908-48c51386efcb" podNamespace="default" podName="test-pod-1" Feb 12 22:04:28.235320 systemd[1]: Created slice kubepods-besteffort-podf1f686c5_9a26_42ca_b908_48c51386efcb.slice. Feb 12 22:04:28.290983 kubelet[2097]: I0212 22:04:28.290946 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-d8a31332-c71b-43f9-8716-fb4823c594e8\" (UniqueName: \"kubernetes.io/nfs/f1f686c5-9a26-42ca-b908-48c51386efcb-pvc-d8a31332-c71b-43f9-8716-fb4823c594e8\") pod \"test-pod-1\" (UID: \"f1f686c5-9a26-42ca-b908-48c51386efcb\") " pod="default/test-pod-1" Feb 12 22:04:28.291179 kubelet[2097]: I0212 22:04:28.291004 2097 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g9gjl\" (UniqueName: \"kubernetes.io/projected/f1f686c5-9a26-42ca-b908-48c51386efcb-kube-api-access-g9gjl\") pod \"test-pod-1\" (UID: \"f1f686c5-9a26-42ca-b908-48c51386efcb\") " pod="default/test-pod-1" Feb 12 22:04:28.430503 kernel: Failed to create system directory netfs Feb 12 22:04:28.430665 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 22:04:28.430702 kernel: audit: type=1400 audit(1707775468.424:930): avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.430753 kernel: Failed to create system directory netfs Feb 12 22:04:28.424000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.437827 kernel: audit: type=1400 audit(1707775468.424:930): avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.437952 kernel: Failed to create system directory netfs Feb 12 22:04:28.424000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.445201 kernel: audit: type=1400 audit(1707775468.424:930): avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.445284 kernel: Failed to create system directory netfs Feb 12 22:04:28.424000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.458898 kernel: audit: type=1400 audit(1707775468.424:930): avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.424000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.424000 audit[3990]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560fb96c35e0 a1=153bc a2=560fb7bc92b0 a3=5 items=0 ppid=1595 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:28.474214 kernel: audit: type=1300 audit(1707775468.424:930): arch=c000003e syscall=175 success=yes exit=0 a0=560fb96c35e0 a1=153bc a2=560fb7bc92b0 a3=5 items=0 ppid=1595 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:28.424000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 22:04:28.485396 kernel: audit: type=1327 audit(1707775468.424:930): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 22:04:28.485568 kernel: Failed to create system directory fscache Feb 12 22:04:28.485607 kernel: audit: type=1400 audit(1707775468.468:931): avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.485655 kernel: Failed to create system directory fscache Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.494925 kernel: audit: type=1400 audit(1707775468.468:931): avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.495055 kernel: Failed to create system directory fscache Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.502842 kernel: audit: type=1400 audit(1707775468.468:931): avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.503010 kernel: Failed to create system directory fscache Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.511024 kernel: audit: type=1400 audit(1707775468.468:931): avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.511192 kernel: Failed to create system directory fscache Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.514026 kernel: Failed to create system directory fscache Feb 12 22:04:28.514106 kernel: Failed to create system directory fscache Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.516844 kernel: Failed to create system directory fscache Feb 12 22:04:28.516956 kernel: Failed to create system directory fscache Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.519475 kernel: Failed to create system directory fscache Feb 12 22:04:28.519541 kernel: Failed to create system directory fscache Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.522191 kernel: Failed to create system directory fscache Feb 12 22:04:28.522236 kernel: Failed to create system directory fscache Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.468000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.524888 kernel: Failed to create system directory fscache Feb 12 22:04:28.468000 audit[3990]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560fb98d89c0 a1=4c0fc a2=560fb7bc92b0 a3=5 items=0 ppid=1595 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:28.468000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 22:04:28.527907 kernel: FS-Cache: Loaded Feb 12 22:04:28.535264 kubelet[2097]: E0212 22:04:28.535194 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.574935 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.577867 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.578104 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.578142 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.580599 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.580683 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.583514 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.583691 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.586249 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.586320 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.588758 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.588816 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.591451 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.591520 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.594198 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.594301 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.598251 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.598339 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.613912 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.614080 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.622270 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.622478 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.627983 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.630478 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.630548 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.633050 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.633139 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.635523 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.635574 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.638667 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.638751 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.641246 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.641300 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.643826 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.643924 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.646354 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.646413 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.648957 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.649024 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.651419 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.651474 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.654020 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.654108 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.656508 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.656556 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.658990 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.659045 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.660295 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.662731 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.662778 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.665173 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.665219 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.667703 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.667782 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.670169 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.670235 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.672726 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.672789 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.673909 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.676357 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.676418 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.678813 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.678869 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.681409 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.681455 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.684006 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.684082 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.686494 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.686538 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.689066 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.689159 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.691548 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.691609 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.692830 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.695326 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.695373 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.701374 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.701474 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.701509 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.701539 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.704038 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.704103 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.706539 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.706597 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.707788 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.709029 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.711486 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.711528 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.714001 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.714062 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.716494 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.716548 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.718996 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.719040 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.721468 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.721509 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.723954 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.724010 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.726437 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.726493 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.728951 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.728994 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.731781 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.731873 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.740286 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.748454 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.748604 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.748642 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.748696 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.748731 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.750031 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.752483 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.752582 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.755074 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.755121 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.757531 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.757616 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.760127 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.760206 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.762587 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.762668 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.766555 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.766630 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.766675 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.767700 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.768938 kernel: Failed to create system directory sunrpc Feb 12 22:04:28.549000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.780127 kernel: RPC: Registered named UNIX socket transport module. Feb 12 22:04:28.780246 kernel: RPC: Registered udp transport module. Feb 12 22:04:28.780306 kernel: RPC: Registered tcp transport module. Feb 12 22:04:28.782787 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 22:04:28.549000 audit[3990]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560fb9924ad0 a1=1588c4 a2=560fb7bc92b0 a3=5 items=6 ppid=1595 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:28.549000 audit: CWD cwd="/" Feb 12 22:04:28.549000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:28.549000 audit: PATH item=1 name=(null) inode=25289 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:28.549000 audit: PATH item=2 name=(null) inode=25289 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:28.549000 audit: PATH item=3 name=(null) inode=25290 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:28.549000 audit: PATH item=4 name=(null) inode=25289 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:28.549000 audit: PATH item=5 name=(null) inode=25291 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:04:28.549000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.821564 kernel: Failed to create system directory nfs Feb 12 22:04:28.821670 kernel: Failed to create system directory nfs Feb 12 22:04:28.821704 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.823745 kernel: Failed to create system directory nfs Feb 12 22:04:28.823836 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.826184 kernel: Failed to create system directory nfs Feb 12 22:04:28.826246 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.828748 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.829970 kernel: Failed to create system directory nfs Feb 12 22:04:28.830023 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.832328 kernel: Failed to create system directory nfs Feb 12 22:04:28.832379 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.834724 kernel: Failed to create system directory nfs Feb 12 22:04:28.834766 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.836967 kernel: Failed to create system directory nfs Feb 12 22:04:28.837032 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.839425 kernel: Failed to create system directory nfs Feb 12 22:04:28.839475 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.841732 kernel: Failed to create system directory nfs Feb 12 22:04:28.841773 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.842947 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.845447 kernel: Failed to create system directory nfs Feb 12 22:04:28.845478 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.848724 kernel: Failed to create system directory nfs Feb 12 22:04:28.848755 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.850424 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.851813 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.854901 kernel: Failed to create system directory nfs Feb 12 22:04:28.854942 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.857841 kernel: Failed to create system directory nfs Feb 12 22:04:28.857903 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.860441 kernel: Failed to create system directory nfs Feb 12 22:04:28.860466 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.861771 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.867180 kernel: Failed to create system directory nfs Feb 12 22:04:28.867237 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.871055 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.872983 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.876361 kernel: Failed to create system directory nfs Feb 12 22:04:28.876416 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.879344 kernel: Failed to create system directory nfs Feb 12 22:04:28.879418 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.883088 kernel: Failed to create system directory nfs Feb 12 22:04:28.883169 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.886759 kernel: Failed to create system directory nfs Feb 12 22:04:28.886830 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.889960 kernel: Failed to create system directory nfs Feb 12 22:04:28.890082 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.891950 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.895308 kernel: Failed to create system directory nfs Feb 12 22:04:28.895408 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.897916 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.901116 kernel: Failed to create system directory nfs Feb 12 22:04:28.901198 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.904547 kernel: Failed to create system directory nfs Feb 12 22:04:28.904627 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.907993 kernel: Failed to create system directory nfs Feb 12 22:04:28.908107 kernel: Failed to create system directory nfs Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.808000 audit[3990]: AVC avc: denied { confidentiality } for pid=3990 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.910899 kernel: Failed to create system directory nfs Feb 12 22:04:28.931063 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 22:04:28.808000 audit[3990]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560fb9ac7680 a1=e29dc a2=560fb7bc92b0 a3=5 items=0 ppid=1595 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:28.808000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.021676 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.021811 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.025815 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.026153 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.028005 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.028112 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.031228 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.031950 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.037241 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.037347 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.040354 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.040441 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.043162 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.043271 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.046048 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.046135 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.047290 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.048988 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.050371 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.053419 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.057425 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.057543 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.060662 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.060798 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.063813 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.063918 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.066374 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.066513 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.069992 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.070174 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.073778 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.073858 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.074959 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.077587 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.077667 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.080041 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.080120 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.082561 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.082636 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.085122 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.085178 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.087671 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.087745 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.090274 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.090371 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.093034 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.093152 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.095329 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.095375 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.098307 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.098385 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.101095 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.101199 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.103831 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.103921 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.105065 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.107421 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.107571 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.110034 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.110081 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.112613 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.112712 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.115073 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.115118 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.117446 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.117489 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.121314 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.121447 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.124696 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.124788 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.127137 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.127211 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.129668 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.129776 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.131073 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.133680 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.133763 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.134905 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.138078 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.140637 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.140799 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.143262 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.143341 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.145819 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.145870 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.148678 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.148781 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.151125 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.151197 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.153799 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.153887 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.157643 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.157733 kernel: Failed to create system directory nfs4 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:28.976000 audit[3995]: AVC avc: denied { confidentiality } for pid=3995 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.160257 kernel: Failed to create system directory nfs4 Feb 12 22:04:29.349487 kernel: NFS: Registering the id_resolver key type Feb 12 22:04:29.349860 kernel: Key type id_resolver registered Feb 12 22:04:29.349926 kernel: Key type id_legacy registered Feb 12 22:04:28.976000 audit[3995]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f3b30c98010 a1=1d3cc4 a2=55c8852322b0 a3=5 items=0 ppid=1595 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:28.976000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.366634 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.366770 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.366832 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.369448 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.369561 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.372012 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.372092 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.374640 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.374727 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.377245 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.377316 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.379831 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.379912 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.383742 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.383888 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.387297 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.387391 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.389909 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.389964 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.392506 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.392597 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.395105 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.395180 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.397656 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.397708 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.358000 audit[3996]: AVC avc: denied { confidentiality } for pid=3996 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:04:29.400513 kernel: Failed to create system directory rpcgss Feb 12 22:04:29.358000 audit[3996]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f891830f010 a1=4f524 a2=55b5f64282b0 a3=5 items=0 ppid=1595 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.358000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 22:04:29.427248 nfsidmap[4003]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Feb 12 22:04:29.431815 nfsidmap[4005]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Feb 12 22:04:29.441000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:04:29.441000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:04:29.441000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:04:29.442000 audit[1833]: AVC avc: denied { watch_reads } for pid=1833 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:04:29.442000 audit[1833]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5637de85d250 a2=10 a3=e353f6e27abed1bb items=0 ppid=1 pid=1833 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.442000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 22:04:29.442000 audit[1833]: AVC avc: denied { watch_reads } for pid=1833 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:04:29.442000 audit[1833]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5637de85d250 a2=10 a3=e353f6e27abed1bb items=0 ppid=1 pid=1833 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.442000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 22:04:29.442000 audit[1833]: AVC avc: denied { watch_reads } for pid=1833 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:04:29.442000 audit[1833]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5637de85d250 a2=10 a3=e353f6e27abed1bb items=0 ppid=1 pid=1833 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.442000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 22:04:29.448171 env[1633]: time="2024-02-12T22:04:29.448130505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:f1f686c5-9a26-42ca-b908-48c51386efcb,Namespace:default,Attempt:0,}" Feb 12 22:04:29.479568 kubelet[2097]: E0212 22:04:29.468032 2097 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:29.535923 kubelet[2097]: E0212 22:04:29.535868 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:29.632061 (udev-worker)[3997]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:04:29.643725 systemd-networkd[1457]: cali5ec59c6bf6e: Link UP Feb 12 22:04:29.650966 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:04:29.651137 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 22:04:29.650850 systemd-networkd[1457]: cali5ec59c6bf6e: Gained carrier Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.521 [INFO][4006] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.213-k8s-test--pod--1-eth0 default f1f686c5-9a26-42ca-b908-48c51386efcb 1181 0 2024-02-12 22:03:57 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.19.213 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.213-k8s-test--pod--1-" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.521 [INFO][4006] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.213-k8s-test--pod--1-eth0" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.556 [INFO][4020] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" HandleID="k8s-pod-network.7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Workload="172.31.19.213-k8s-test--pod--1-eth0" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.570 [INFO][4020] ipam_plugin.go 268: Auto assigning IP ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" HandleID="k8s-pod-network.7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Workload="172.31.19.213-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004a1aa0), Attrs:map[string]string{"namespace":"default", "node":"172.31.19.213", "pod":"test-pod-1", "timestamp":"2024-02-12 22:04:29.556384734 +0000 UTC"}, Hostname:"172.31.19.213", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.570 [INFO][4020] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.571 [INFO][4020] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.571 [INFO][4020] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.213' Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.573 [INFO][4020] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" host="172.31.19.213" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.579 [INFO][4020] ipam.go 372: Looking up existing affinities for host host="172.31.19.213" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.585 [INFO][4020] ipam.go 489: Trying affinity for 192.168.39.192/26 host="172.31.19.213" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.588 [INFO][4020] ipam.go 155: Attempting to load block cidr=192.168.39.192/26 host="172.31.19.213" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.592 [INFO][4020] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.39.192/26 host="172.31.19.213" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.592 [INFO][4020] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.39.192/26 handle="k8s-pod-network.7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" host="172.31.19.213" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.595 [INFO][4020] ipam.go 1682: Creating new handle: k8s-pod-network.7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449 Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.601 [INFO][4020] ipam.go 1203: Writing block in order to claim IPs block=192.168.39.192/26 handle="k8s-pod-network.7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" host="172.31.19.213" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.619 [INFO][4020] ipam.go 1216: Successfully claimed IPs: [192.168.39.197/26] block=192.168.39.192/26 handle="k8s-pod-network.7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" host="172.31.19.213" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.620 [INFO][4020] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.39.197/26] handle="k8s-pod-network.7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" host="172.31.19.213" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.620 [INFO][4020] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.620 [INFO][4020] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.39.197/26] IPv6=[] ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" HandleID="k8s-pod-network.7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Workload="172.31.19.213-k8s-test--pod--1-eth0" Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.625 [INFO][4006] k8s.go 385: Populated endpoint ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.213-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"f1f686c5-9a26-42ca-b908-48c51386efcb", ResourceVersion:"1181", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.39.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:04:29.673919 env[1633]: 2024-02-12 22:04:29.625 [INFO][4006] k8s.go 386: Calico CNI using IPs: [192.168.39.197/32] ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.213-k8s-test--pod--1-eth0" Feb 12 22:04:29.674862 env[1633]: 2024-02-12 22:04:29.625 [INFO][4006] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.213-k8s-test--pod--1-eth0" Feb 12 22:04:29.674862 env[1633]: 2024-02-12 22:04:29.653 [INFO][4006] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.213-k8s-test--pod--1-eth0" Feb 12 22:04:29.674862 env[1633]: 2024-02-12 22:04:29.654 [INFO][4006] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.213-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.213-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"f1f686c5-9a26-42ca-b908-48c51386efcb", ResourceVersion:"1181", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 3, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.213", ContainerID:"7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.39.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"3e:2e:aa:ed:99:a5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:04:29.674862 env[1633]: 2024-02-12 22:04:29.662 [INFO][4006] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.213-k8s-test--pod--1-eth0" Feb 12 22:04:29.692000 audit[4039]: NETFILTER_CFG table=filter:87 family=2 entries=48 op=nft_register_chain pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:04:29.692000 audit[4039]: SYSCALL arch=c000003e syscall=46 success=yes exit=23120 a0=3 a1=7fffcfe0f320 a2=0 a3=7fffcfe0f30c items=0 ppid=2787 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.692000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:04:29.701664 env[1633]: time="2024-02-12T22:04:29.701479138Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:04:29.701664 env[1633]: time="2024-02-12T22:04:29.701618462Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:04:29.701664 env[1633]: time="2024-02-12T22:04:29.701638354Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:04:29.702345 env[1633]: time="2024-02-12T22:04:29.702286781Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449 pid=4047 runtime=io.containerd.runc.v2 Feb 12 22:04:29.732373 systemd[1]: Started cri-containerd-7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449.scope. Feb 12 22:04:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.754000 audit: BPF prog-id=134 op=LOAD Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4047 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766303262366265373533313662623636353436353538636131353836 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4047 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766303262366265373533313662623636353436353538636131353836 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit: BPF prog-id=135 op=LOAD Feb 12 22:04:29.755000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ae1f0 items=0 ppid=4047 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766303262366265373533313662623636353436353538636131353836 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit: BPF prog-id=136 op=LOAD Feb 12 22:04:29.755000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003ae238 items=0 ppid=4047 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766303262366265373533313662623636353436353538636131353836 Feb 12 22:04:29.755000 audit: BPF prog-id=136 op=UNLOAD Feb 12 22:04:29.755000 audit: BPF prog-id=135 op=UNLOAD Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:29.755000 audit: BPF prog-id=137 op=LOAD Feb 12 22:04:29.755000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ae648 items=0 ppid=4047 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:29.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766303262366265373533313662623636353436353538636131353836 Feb 12 22:04:29.813851 env[1633]: time="2024-02-12T22:04:29.813800763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:f1f686c5-9a26-42ca-b908-48c51386efcb,Namespace:default,Attempt:0,} returns sandbox id \"7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449\"" Feb 12 22:04:29.816087 env[1633]: time="2024-02-12T22:04:29.816050989Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 22:04:30.192919 env[1633]: time="2024-02-12T22:04:30.192851194Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:30.195733 env[1633]: time="2024-02-12T22:04:30.195689614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:30.198626 env[1633]: time="2024-02-12T22:04:30.198591123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:30.201486 env[1633]: time="2024-02-12T22:04:30.201439511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:04:30.203266 env[1633]: time="2024-02-12T22:04:30.203224401Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 22:04:30.208514 env[1633]: time="2024-02-12T22:04:30.207250749Z" level=info msg="CreateContainer within sandbox \"7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 22:04:30.251902 env[1633]: time="2024-02-12T22:04:30.251667125Z" level=info msg="CreateContainer within sandbox \"7f02b6be75316bb66546558ca158680bd94936ef7a0ae3520413ffa03c88c449\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"452c736d83137276c33df21cc0a3a96e7ddb8af41ae5fdfc5e985e39d3bababa\"" Feb 12 22:04:30.255158 env[1633]: time="2024-02-12T22:04:30.255112390Z" level=info msg="StartContainer for \"452c736d83137276c33df21cc0a3a96e7ddb8af41ae5fdfc5e985e39d3bababa\"" Feb 12 22:04:30.284462 systemd[1]: Started cri-containerd-452c736d83137276c33df21cc0a3a96e7ddb8af41ae5fdfc5e985e39d3bababa.scope. Feb 12 22:04:30.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit: BPF prog-id=138 op=LOAD Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4047 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:30.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435326337333664383331333732373663333364663231636330613361 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4047 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:30.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435326337333664383331333732373663333364663231636330613361 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit: BPF prog-id=139 op=LOAD Feb 12 22:04:30.308000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c0580 items=0 ppid=4047 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:30.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435326337333664383331333732373663333364663231636330613361 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.308000 audit: BPF prog-id=140 op=LOAD Feb 12 22:04:30.308000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c05c8 items=0 ppid=4047 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:30.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435326337333664383331333732373663333364663231636330613361 Feb 12 22:04:30.308000 audit: BPF prog-id=140 op=UNLOAD Feb 12 22:04:30.309000 audit: BPF prog-id=139 op=UNLOAD Feb 12 22:04:30.309000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.309000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.309000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.309000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.309000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.309000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.309000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.309000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.309000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.309000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:30.309000 audit: BPF prog-id=141 op=LOAD Feb 12 22:04:30.309000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c09d8 items=0 ppid=4047 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:30.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435326337333664383331333732373663333364663231636330613361 Feb 12 22:04:30.331965 env[1633]: time="2024-02-12T22:04:30.331930072Z" level=info msg="StartContainer for \"452c736d83137276c33df21cc0a3a96e7ddb8af41ae5fdfc5e985e39d3bababa\" returns successfully" Feb 12 22:04:30.536632 kubelet[2097]: E0212 22:04:30.536584 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:30.953636 kubelet[2097]: I0212 22:04:30.953333 2097 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=33.564390176 podCreationTimestamp="2024-02-12 22:03:57 +0000 UTC" firstStartedPulling="2024-02-12 22:04:29.815392635 +0000 UTC m=+80.796603212" lastFinishedPulling="2024-02-12 22:04:30.204302744 +0000 UTC m=+81.185513331" observedRunningTime="2024-02-12 22:04:30.953019193 +0000 UTC m=+81.934229792" watchObservedRunningTime="2024-02-12 22:04:30.953300295 +0000 UTC m=+81.934510893" Feb 12 22:04:31.341192 systemd-networkd[1457]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 22:04:31.536995 kubelet[2097]: E0212 22:04:31.536945 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:32.537372 kubelet[2097]: E0212 22:04:32.537320 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:33.538666 kubelet[2097]: E0212 22:04:33.538613 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:34.539790 kubelet[2097]: E0212 22:04:34.539735 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:35.540726 kubelet[2097]: E0212 22:04:35.540690 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:36.541481 kubelet[2097]: E0212 22:04:36.541436 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:37.542454 kubelet[2097]: E0212 22:04:37.542388 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:38.543171 kubelet[2097]: E0212 22:04:38.543116 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:39.544108 kubelet[2097]: E0212 22:04:39.544069 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:40.544276 kubelet[2097]: E0212 22:04:40.544213 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:40.650982 kernel: kauditd_printk_skb: 461 callbacks suppressed Feb 12 22:04:40.651152 kernel: audit: type=1400 audit(1707775480.646:979): avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.646000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.646000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.663083 kernel: audit: type=1300 audit(1707775480.646:979): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.663218 kernel: audit: type=1327 audit(1707775480.646:979): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.646000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.647000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.671295 kernel: audit: type=1400 audit(1707775480.647:980): avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.671432 kernel: audit: type=1300 audit(1707775480.647:980): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.647000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.682150 kernel: audit: type=1327 audit(1707775480.647:980): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.682258 kernel: audit: type=1400 audit(1707775480.647:981): avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.647000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.647000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.701344 kernel: audit: type=1300 audit(1707775480.647:981): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.701512 kernel: audit: type=1327 audit(1707775480.647:981): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.647000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.709469 kernel: audit: type=1400 audit(1707775480.647:982): avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.647000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.647000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.647000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.647000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.647000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.647000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.647000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.647000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.647000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.647000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.648000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.648000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.648000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.648000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.648000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.648000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.648000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.648000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.648000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.648000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.648000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.648000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.648000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.648000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.648000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.648000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.648000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.648000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.708000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.708000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.708000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.708000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.708000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.708000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.708000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.708000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.708000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.708000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.708000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.708000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.710000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.710000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.710000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.710000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.710000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.710000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.710000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.710000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.710000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.710000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.710000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.710000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.710000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.710000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.710000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.710000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.710000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.710000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.710000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.710000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.710000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.710000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.710000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.710000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.710000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.710000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.710000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.710000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.710000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.710000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.711000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.711000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.711000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.711000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.711000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.711000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.711000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.711000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.711000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.711000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.711000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.711000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.711000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.711000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.711000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.711000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.711000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.711000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.711000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.711000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.711000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.711000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.711000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.711000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.711000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.711000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.711000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:40.711000 audit[4258]: AVC avc: denied { bpf } for pid=4258 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:40.711000 audit[4258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcf05123f0 a2=70 a3=7ffcf0512510 items=0 ppid=4243 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:40.711000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 12 22:04:41.545219 kubelet[2097]: E0212 22:04:41.545176 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:42.545423 kubelet[2097]: E0212 22:04:42.545367 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:43.546126 kubelet[2097]: E0212 22:04:43.546075 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:44.547228 kubelet[2097]: E0212 22:04:44.547174 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:45.548048 kubelet[2097]: E0212 22:04:45.547992 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:46.548609 kubelet[2097]: E0212 22:04:46.548563 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:47.548998 kubelet[2097]: E0212 22:04:47.548947 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:48.549487 kubelet[2097]: E0212 22:04:48.549432 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:49.466719 kubelet[2097]: E0212 22:04:49.466666 2097 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:49.550205 kubelet[2097]: E0212 22:04:49.550143 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:50.550364 kubelet[2097]: E0212 22:04:50.550312 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:51.550851 kubelet[2097]: E0212 22:04:51.550788 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:52.551833 kubelet[2097]: E0212 22:04:52.551764 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:52.778817 kubelet[2097]: E0212 22:04:52.778771 2097 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.247:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.213?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" Feb 12 22:04:53.140799 kubelet[2097]: E0212 22:04:53.140747 2097 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"172.31.19.213\": Get \"https://172.31.21.247:6443/api/v1/nodes/172.31.19.213?resourceVersion=0&timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" Feb 12 22:04:53.552647 kubelet[2097]: E0212 22:04:53.552591 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:54.553502 kubelet[2097]: E0212 22:04:54.553441 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:04:55.554521 kubelet[2097]: E0212 22:04:55.554468 2097 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"