Feb 12 22:23:23.026110 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 22:23:23.026146 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:23:23.026194 kernel: BIOS-provided physical RAM map: Feb 12 22:23:23.026206 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 22:23:23.026217 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 22:23:23.026228 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 22:23:23.026276 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Feb 12 22:23:23.026290 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Feb 12 22:23:23.026302 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Feb 12 22:23:23.026314 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 22:23:23.026357 kernel: NX (Execute Disable) protection: active Feb 12 22:23:23.026370 kernel: SMBIOS 2.7 present. Feb 12 22:23:23.026383 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Feb 12 22:23:23.026395 kernel: Hypervisor detected: KVM Feb 12 22:23:23.026446 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 22:23:23.026461 kernel: kvm-clock: cpu 0, msr 64faa001, primary cpu clock Feb 12 22:23:23.026473 kernel: kvm-clock: using sched offset of 6768838814 cycles Feb 12 22:23:23.026487 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 22:23:23.026532 kernel: tsc: Detected 2500.004 MHz processor Feb 12 22:23:23.026547 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 22:23:23.026564 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 22:23:23.026606 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Feb 12 22:23:23.026623 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 22:23:23.026637 kernel: Using GB pages for direct mapping Feb 12 22:23:23.026650 kernel: ACPI: Early table checksum verification disabled Feb 12 22:23:23.026692 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Feb 12 22:23:23.026708 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Feb 12 22:23:23.026722 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 12 22:23:23.026734 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Feb 12 22:23:23.026869 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Feb 12 22:23:23.026889 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 22:23:23.026902 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 12 22:23:23.026915 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Feb 12 22:23:23.026957 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 12 22:23:23.035507 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Feb 12 22:23:23.035542 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Feb 12 22:23:23.035555 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 22:23:23.035573 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Feb 12 22:23:23.035585 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Feb 12 22:23:23.035596 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Feb 12 22:23:23.035613 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Feb 12 22:23:23.035626 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Feb 12 22:23:23.035638 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Feb 12 22:23:23.035651 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Feb 12 22:23:23.035666 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Feb 12 22:23:23.035678 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Feb 12 22:23:23.035690 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Feb 12 22:23:23.035703 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 22:23:23.035716 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 22:23:23.035728 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Feb 12 22:23:23.035740 kernel: NUMA: Initialized distance table, cnt=1 Feb 12 22:23:23.035753 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Feb 12 22:23:23.035768 kernel: Zone ranges: Feb 12 22:23:23.035781 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 22:23:23.035793 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Feb 12 22:23:23.035805 kernel: Normal empty Feb 12 22:23:23.035817 kernel: Movable zone start for each node Feb 12 22:23:23.035829 kernel: Early memory node ranges Feb 12 22:23:23.035841 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 22:23:23.035854 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Feb 12 22:23:23.035867 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Feb 12 22:23:23.035883 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 22:23:23.035897 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 22:23:23.035911 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Feb 12 22:23:23.035925 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 22:23:23.035939 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 22:23:23.035952 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Feb 12 22:23:23.035966 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 22:23:23.035980 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 22:23:23.035994 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 22:23:23.036018 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 22:23:23.039095 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 22:23:23.039113 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 22:23:23.039128 kernel: TSC deadline timer available Feb 12 22:23:23.039142 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 22:23:23.039156 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Feb 12 22:23:23.039170 kernel: Booting paravirtualized kernel on KVM Feb 12 22:23:23.039185 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 22:23:23.039200 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 22:23:23.039219 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 22:23:23.039234 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 22:23:23.039248 kernel: pcpu-alloc: [0] 0 1 Feb 12 22:23:23.039262 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Feb 12 22:23:23.039276 kernel: kvm-guest: PV spinlocks enabled Feb 12 22:23:23.039290 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 22:23:23.039304 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Feb 12 22:23:23.039318 kernel: Policy zone: DMA32 Feb 12 22:23:23.039335 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:23:23.039353 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 22:23:23.039367 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 22:23:23.039381 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 22:23:23.039395 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 22:23:23.039410 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved) Feb 12 22:23:23.039424 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 22:23:23.039438 kernel: Kernel/User page tables isolation: enabled Feb 12 22:23:23.039452 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 22:23:23.039469 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 22:23:23.039483 kernel: rcu: Hierarchical RCU implementation. Feb 12 22:23:23.039498 kernel: rcu: RCU event tracing is enabled. Feb 12 22:23:23.039512 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 22:23:23.039526 kernel: Rude variant of Tasks RCU enabled. Feb 12 22:23:23.039540 kernel: Tracing variant of Tasks RCU enabled. Feb 12 22:23:23.039554 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 22:23:23.039568 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 22:23:23.039582 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 22:23:23.039599 kernel: random: crng init done Feb 12 22:23:23.039612 kernel: Console: colour VGA+ 80x25 Feb 12 22:23:23.039626 kernel: printk: console [ttyS0] enabled Feb 12 22:23:23.039640 kernel: ACPI: Core revision 20210730 Feb 12 22:23:23.039718 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Feb 12 22:23:23.039735 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 22:23:23.039749 kernel: x2apic enabled Feb 12 22:23:23.039763 kernel: Switched APIC routing to physical x2apic. Feb 12 22:23:23.039777 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093d6e846, max_idle_ns: 440795249997 ns Feb 12 22:23:23.039791 kernel: Calibrating delay loop (skipped) preset value.. 5000.00 BogoMIPS (lpj=2500004) Feb 12 22:23:23.039808 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 22:23:23.039822 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 22:23:23.039836 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 22:23:23.039860 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 22:23:23.039877 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 22:23:23.039890 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 22:23:23.039905 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 12 22:23:23.039920 kernel: RETBleed: Vulnerable Feb 12 22:23:23.039933 kernel: Speculative Store Bypass: Vulnerable Feb 12 22:23:23.039947 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 22:23:23.039962 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 22:23:23.039976 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 22:23:23.039990 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 22:23:23.040034 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 22:23:23.040050 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 22:23:23.040064 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 12 22:23:23.040079 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 12 22:23:23.040093 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 12 22:23:23.040108 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 12 22:23:23.040126 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 12 22:23:23.040140 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Feb 12 22:23:23.040154 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 22:23:23.040169 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 12 22:23:23.040184 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 12 22:23:23.040198 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Feb 12 22:23:23.040212 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Feb 12 22:23:23.040226 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Feb 12 22:23:23.040241 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Feb 12 22:23:23.040255 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Feb 12 22:23:23.040269 kernel: Freeing SMP alternatives memory: 32K Feb 12 22:23:23.040341 kernel: pid_max: default: 32768 minimum: 301 Feb 12 22:23:23.040356 kernel: LSM: Security Framework initializing Feb 12 22:23:23.040371 kernel: SELinux: Initializing. Feb 12 22:23:23.040426 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:23:23.040442 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:23:23.040457 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 12 22:23:23.040472 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 12 22:23:23.040487 kernel: signal: max sigframe size: 3632 Feb 12 22:23:23.040502 kernel: rcu: Hierarchical SRCU implementation. Feb 12 22:23:23.040517 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 22:23:23.040532 kernel: smp: Bringing up secondary CPUs ... Feb 12 22:23:23.040550 kernel: x86: Booting SMP configuration: Feb 12 22:23:23.040564 kernel: .... node #0, CPUs: #1 Feb 12 22:23:23.040579 kernel: kvm-clock: cpu 1, msr 64faa041, secondary cpu clock Feb 12 22:23:23.040594 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Feb 12 22:23:23.040610 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 12 22:23:23.040626 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 22:23:23.040640 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 22:23:23.040655 kernel: smpboot: Max logical packages: 1 Feb 12 22:23:23.040672 kernel: smpboot: Total of 2 processors activated (10000.01 BogoMIPS) Feb 12 22:23:23.040687 kernel: devtmpfs: initialized Feb 12 22:23:23.040701 kernel: x86/mm: Memory block size: 128MB Feb 12 22:23:23.040716 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 22:23:23.040731 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 22:23:23.040746 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 22:23:23.040761 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 22:23:23.040776 kernel: audit: initializing netlink subsys (disabled) Feb 12 22:23:23.040791 kernel: audit: type=2000 audit(1707776602.037:1): state=initialized audit_enabled=0 res=1 Feb 12 22:23:23.040808 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 22:23:23.040823 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 22:23:23.040837 kernel: cpuidle: using governor menu Feb 12 22:23:23.040852 kernel: ACPI: bus type PCI registered Feb 12 22:23:23.040867 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 22:23:23.040882 kernel: dca service started, version 1.12.1 Feb 12 22:23:23.040897 kernel: PCI: Using configuration type 1 for base access Feb 12 22:23:23.040911 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 22:23:23.040926 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 22:23:23.040944 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 22:23:23.040959 kernel: ACPI: Added _OSI(Module Device) Feb 12 22:23:23.040974 kernel: ACPI: Added _OSI(Processor Device) Feb 12 22:23:23.040988 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 22:23:23.041003 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 22:23:23.041018 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 22:23:23.045141 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 22:23:23.045212 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 22:23:23.045231 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 12 22:23:23.045252 kernel: ACPI: Interpreter enabled Feb 12 22:23:23.045267 kernel: ACPI: PM: (supports S0 S5) Feb 12 22:23:23.045282 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 22:23:23.045363 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 22:23:23.045380 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 12 22:23:23.045437 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 22:23:23.045798 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 22:23:23.046061 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 22:23:23.046123 kernel: acpiphp: Slot [3] registered Feb 12 22:23:23.046141 kernel: acpiphp: Slot [4] registered Feb 12 22:23:23.046156 kernel: acpiphp: Slot [5] registered Feb 12 22:23:23.046207 kernel: acpiphp: Slot [6] registered Feb 12 22:23:23.046224 kernel: acpiphp: Slot [7] registered Feb 12 22:23:23.046238 kernel: acpiphp: Slot [8] registered Feb 12 22:23:23.046287 kernel: acpiphp: Slot [9] registered Feb 12 22:23:23.046305 kernel: acpiphp: Slot [10] registered Feb 12 22:23:23.046320 kernel: acpiphp: Slot [11] registered Feb 12 22:23:23.046467 kernel: acpiphp: Slot [12] registered Feb 12 22:23:23.046484 kernel: acpiphp: Slot [13] registered Feb 12 22:23:23.046499 kernel: acpiphp: Slot [14] registered Feb 12 22:23:23.046514 kernel: acpiphp: Slot [15] registered Feb 12 22:23:23.046528 kernel: acpiphp: Slot [16] registered Feb 12 22:23:23.046543 kernel: acpiphp: Slot [17] registered Feb 12 22:23:23.046558 kernel: acpiphp: Slot [18] registered Feb 12 22:23:23.046572 kernel: acpiphp: Slot [19] registered Feb 12 22:23:23.046587 kernel: acpiphp: Slot [20] registered Feb 12 22:23:23.046605 kernel: acpiphp: Slot [21] registered Feb 12 22:23:23.046620 kernel: acpiphp: Slot [22] registered Feb 12 22:23:23.046702 kernel: acpiphp: Slot [23] registered Feb 12 22:23:23.046722 kernel: acpiphp: Slot [24] registered Feb 12 22:23:23.046738 kernel: acpiphp: Slot [25] registered Feb 12 22:23:23.046753 kernel: acpiphp: Slot [26] registered Feb 12 22:23:23.046767 kernel: acpiphp: Slot [27] registered Feb 12 22:23:23.046782 kernel: acpiphp: Slot [28] registered Feb 12 22:23:23.046796 kernel: acpiphp: Slot [29] registered Feb 12 22:23:23.046811 kernel: acpiphp: Slot [30] registered Feb 12 22:23:23.046829 kernel: acpiphp: Slot [31] registered Feb 12 22:23:23.046844 kernel: PCI host bridge to bus 0000:00 Feb 12 22:23:23.046992 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 22:23:23.061262 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 22:23:23.061410 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 22:23:23.061522 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 22:23:23.061631 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 22:23:23.061781 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 22:23:23.061923 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 22:23:23.062066 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Feb 12 22:23:23.062190 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 22:23:23.062312 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 12 22:23:23.062432 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Feb 12 22:23:23.062550 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Feb 12 22:23:23.062673 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Feb 12 22:23:23.062793 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Feb 12 22:23:23.062914 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Feb 12 22:23:23.063042 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Feb 12 22:23:23.063172 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Feb 12 22:23:23.063292 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Feb 12 22:23:23.063412 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 12 22:23:23.063601 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 22:23:23.063735 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 12 22:23:23.063858 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Feb 12 22:23:23.063987 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 12 22:23:23.064123 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Feb 12 22:23:23.064140 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 22:23:23.064158 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 22:23:23.064172 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 22:23:23.064186 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 22:23:23.064200 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 22:23:23.064214 kernel: iommu: Default domain type: Translated Feb 12 22:23:23.064227 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 22:23:23.064440 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Feb 12 22:23:23.064573 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 22:23:23.064688 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Feb 12 22:23:23.064709 kernel: vgaarb: loaded Feb 12 22:23:23.064723 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 22:23:23.064737 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 22:23:23.064751 kernel: PTP clock support registered Feb 12 22:23:23.064764 kernel: PCI: Using ACPI for IRQ routing Feb 12 22:23:23.064779 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 22:23:23.064793 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 22:23:23.064807 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Feb 12 22:23:23.064820 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 12 22:23:23.064836 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Feb 12 22:23:23.064850 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 22:23:23.064864 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 22:23:23.064878 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 22:23:23.064892 kernel: pnp: PnP ACPI init Feb 12 22:23:23.064905 kernel: pnp: PnP ACPI: found 5 devices Feb 12 22:23:23.064918 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 22:23:23.064932 kernel: NET: Registered PF_INET protocol family Feb 12 22:23:23.064950 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 22:23:23.064965 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 22:23:23.064978 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 22:23:23.064994 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 22:23:23.065010 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 22:23:23.072089 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 22:23:23.072124 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:23:23.072141 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:23:23.072156 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 22:23:23.072177 kernel: NET: Registered PF_XDP protocol family Feb 12 22:23:23.072354 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 22:23:23.072524 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 22:23:23.072655 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 22:23:23.072913 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 22:23:23.073075 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 22:23:23.073207 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 22:23:23.073227 kernel: PCI: CLS 0 bytes, default 64 Feb 12 22:23:23.073248 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 22:23:23.073263 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093d6e846, max_idle_ns: 440795249997 ns Feb 12 22:23:23.073278 kernel: clocksource: Switched to clocksource tsc Feb 12 22:23:23.073293 kernel: Initialise system trusted keyrings Feb 12 22:23:23.073307 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 22:23:23.073364 kernel: Key type asymmetric registered Feb 12 22:23:23.073380 kernel: Asymmetric key parser 'x509' registered Feb 12 22:23:23.073394 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 22:23:23.073413 kernel: io scheduler mq-deadline registered Feb 12 22:23:23.073428 kernel: io scheduler kyber registered Feb 12 22:23:23.073442 kernel: io scheduler bfq registered Feb 12 22:23:23.073456 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 22:23:23.073469 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 22:23:23.073483 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 22:23:23.073497 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 22:23:23.073511 kernel: i8042: Warning: Keylock active Feb 12 22:23:23.073525 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 22:23:23.073538 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 22:23:23.073674 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 12 22:23:23.073783 kernel: rtc_cmos 00:00: registered as rtc0 Feb 12 22:23:23.073974 kernel: rtc_cmos 00:00: setting system clock to 2024-02-12T22:23:22 UTC (1707776602) Feb 12 22:23:23.074100 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 12 22:23:23.074117 kernel: intel_pstate: CPU model not supported Feb 12 22:23:23.074131 kernel: NET: Registered PF_INET6 protocol family Feb 12 22:23:23.074157 kernel: Segment Routing with IPv6 Feb 12 22:23:23.074174 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 22:23:23.074188 kernel: NET: Registered PF_PACKET protocol family Feb 12 22:23:23.074201 kernel: Key type dns_resolver registered Feb 12 22:23:23.074214 kernel: IPI shorthand broadcast: enabled Feb 12 22:23:23.074228 kernel: sched_clock: Marking stable (442423180, 256778993)->(864511492, -165309319) Feb 12 22:23:23.074242 kernel: registered taskstats version 1 Feb 12 22:23:23.074255 kernel: Loading compiled-in X.509 certificates Feb 12 22:23:23.074268 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 22:23:23.074281 kernel: Key type .fscrypt registered Feb 12 22:23:23.074297 kernel: Key type fscrypt-provisioning registered Feb 12 22:23:23.074310 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 22:23:23.074323 kernel: ima: Allocated hash algorithm: sha1 Feb 12 22:23:23.074338 kernel: ima: No architecture policies found Feb 12 22:23:23.074352 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 22:23:23.074364 kernel: Write protecting the kernel read-only data: 28672k Feb 12 22:23:23.074377 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 22:23:23.074389 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 22:23:23.074402 kernel: Run /init as init process Feb 12 22:23:23.074419 kernel: with arguments: Feb 12 22:23:23.074433 kernel: /init Feb 12 22:23:23.074446 kernel: with environment: Feb 12 22:23:23.074459 kernel: HOME=/ Feb 12 22:23:23.074490 kernel: TERM=linux Feb 12 22:23:23.074505 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 22:23:23.074523 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:23:23.074541 systemd[1]: Detected virtualization amazon. Feb 12 22:23:23.074560 systemd[1]: Detected architecture x86-64. Feb 12 22:23:23.074575 systemd[1]: Running in initrd. Feb 12 22:23:23.074589 systemd[1]: No hostname configured, using default hostname. Feb 12 22:23:23.074604 systemd[1]: Hostname set to . Feb 12 22:23:23.074716 systemd[1]: Initializing machine ID from VM UUID. Feb 12 22:23:23.074732 systemd[1]: Queued start job for default target initrd.target. Feb 12 22:23:23.074747 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:23:23.074762 systemd[1]: Reached target cryptsetup.target. Feb 12 22:23:23.074777 systemd[1]: Reached target paths.target. Feb 12 22:23:23.074791 systemd[1]: Reached target slices.target. Feb 12 22:23:23.074803 systemd[1]: Reached target swap.target. Feb 12 22:23:23.074825 systemd[1]: Reached target timers.target. Feb 12 22:23:23.074838 systemd[1]: Listening on iscsid.socket. Feb 12 22:23:23.074856 systemd[1]: Listening on iscsiuio.socket. Feb 12 22:23:23.074869 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 22:23:23.074887 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 22:23:23.074903 systemd[1]: Listening on systemd-journald.socket. Feb 12 22:23:23.074918 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:23:23.074932 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:23:23.074948 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:23:23.074963 systemd[1]: Reached target sockets.target. Feb 12 22:23:23.074979 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:23:23.074998 systemd[1]: Finished network-cleanup.service. Feb 12 22:23:23.075014 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 22:23:23.081077 systemd[1]: Starting systemd-journald.service... Feb 12 22:23:23.081111 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:23:23.081128 systemd[1]: Starting systemd-resolved.service... Feb 12 22:23:23.081145 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 22:23:23.081162 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 22:23:23.081180 kernel: Bridge firewalling registered Feb 12 22:23:23.081201 systemd-journald[185]: Journal started Feb 12 22:23:23.081297 systemd-journald[185]: Runtime Journal (/run/log/journal/ec281b02dd70efca2db94a6aeb942127) is 4.8M, max 38.7M, 33.9M free. Feb 12 22:23:23.031257 systemd-modules-load[186]: Inserted module 'overlay' Feb 12 22:23:23.247674 kernel: SCSI subsystem initialized Feb 12 22:23:23.247706 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 22:23:23.247727 kernel: device-mapper: uevent: version 1.0.3 Feb 12 22:23:23.247744 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 22:23:23.247765 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 22:23:23.247787 systemd[1]: Started systemd-journald.service. Feb 12 22:23:23.247808 kernel: audit: type=1130 audit(1707776603.247:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.074838 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 12 22:23:23.133251 systemd-resolved[187]: Positive Trust Anchors: Feb 12 22:23:23.133270 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:23:23.261547 kernel: audit: type=1130 audit(1707776603.255:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.133320 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:23:23.139520 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 12 22:23:23.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.276046 kernel: audit: type=1130 audit(1707776603.268:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.140907 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 12 22:23:23.253918 systemd[1]: Started systemd-resolved.service. Feb 12 22:23:23.283150 kernel: audit: type=1130 audit(1707776603.278:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.261508 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:23:23.275937 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 22:23:23.291058 kernel: audit: type=1130 audit(1707776603.284:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.283099 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:23:23.291214 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 22:23:23.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.294796 systemd[1]: Reached target nss-lookup.target. Feb 12 22:23:23.300088 kernel: audit: type=1130 audit(1707776603.294:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.302509 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 22:23:23.305548 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:23:23.307621 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:23:23.319798 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:23:23.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.325065 kernel: audit: type=1130 audit(1707776603.320:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.327887 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:23:23.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.334092 kernel: audit: type=1130 audit(1707776603.328:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.341387 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 22:23:23.343697 systemd[1]: Starting dracut-cmdline.service... Feb 12 22:23:23.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.350178 kernel: audit: type=1130 audit(1707776603.342:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.358845 dracut-cmdline[207]: dracut-dracut-053 Feb 12 22:23:23.365571 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:23:23.448061 kernel: Loading iSCSI transport class v2.0-870. Feb 12 22:23:23.463050 kernel: iscsi: registered transport (tcp) Feb 12 22:23:23.500835 kernel: iscsi: registered transport (qla4xxx) Feb 12 22:23:23.500910 kernel: QLogic iSCSI HBA Driver Feb 12 22:23:23.562402 systemd[1]: Finished dracut-cmdline.service. Feb 12 22:23:23.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:23.565055 systemd[1]: Starting dracut-pre-udev.service... Feb 12 22:23:23.622071 kernel: raid6: avx512x4 gen() 13125 MB/s Feb 12 22:23:23.639075 kernel: raid6: avx512x4 xor() 7443 MB/s Feb 12 22:23:23.656054 kernel: raid6: avx512x2 gen() 17638 MB/s Feb 12 22:23:23.673058 kernel: raid6: avx512x2 xor() 23672 MB/s Feb 12 22:23:23.691703 kernel: raid6: avx512x1 gen() 16369 MB/s Feb 12 22:23:23.708064 kernel: raid6: avx512x1 xor() 17537 MB/s Feb 12 22:23:23.725071 kernel: raid6: avx2x4 gen() 17245 MB/s Feb 12 22:23:23.742057 kernel: raid6: avx2x4 xor() 7461 MB/s Feb 12 22:23:23.759058 kernel: raid6: avx2x2 gen() 17655 MB/s Feb 12 22:23:23.776076 kernel: raid6: avx2x2 xor() 16983 MB/s Feb 12 22:23:23.793092 kernel: raid6: avx2x1 gen() 13146 MB/s Feb 12 22:23:23.811119 kernel: raid6: avx2x1 xor() 12182 MB/s Feb 12 22:23:23.828073 kernel: raid6: sse2x4 gen() 7979 MB/s Feb 12 22:23:23.846185 kernel: raid6: sse2x4 xor() 4209 MB/s Feb 12 22:23:23.863079 kernel: raid6: sse2x2 gen() 8576 MB/s Feb 12 22:23:23.881088 kernel: raid6: sse2x2 xor() 4957 MB/s Feb 12 22:23:23.899244 kernel: raid6: sse2x1 gen() 7646 MB/s Feb 12 22:23:23.918171 kernel: raid6: sse2x1 xor() 3420 MB/s Feb 12 22:23:23.918246 kernel: raid6: using algorithm avx2x2 gen() 17655 MB/s Feb 12 22:23:23.918265 kernel: raid6: .... xor() 16983 MB/s, rmw enabled Feb 12 22:23:23.919575 kernel: raid6: using avx512x2 recovery algorithm Feb 12 22:23:23.936054 kernel: xor: automatically using best checksumming function avx Feb 12 22:23:24.059057 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 22:23:24.072068 systemd[1]: Finished dracut-pre-udev.service. Feb 12 22:23:24.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:24.073000 audit: BPF prog-id=7 op=LOAD Feb 12 22:23:24.074000 audit: BPF prog-id=8 op=LOAD Feb 12 22:23:24.074691 systemd[1]: Starting systemd-udevd.service... Feb 12 22:23:24.089597 systemd-udevd[385]: Using default interface naming scheme 'v252'. Feb 12 22:23:24.096071 systemd[1]: Started systemd-udevd.service. Feb 12 22:23:24.098388 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 22:23:24.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:24.120271 dracut-pre-trigger[393]: rd.md=0: removing MD RAID activation Feb 12 22:23:24.154317 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 22:23:24.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:24.157000 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:23:24.202046 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:23:24.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:24.269046 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 22:23:24.289517 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 12 22:23:24.289782 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 12 22:23:24.297050 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Feb 12 22:23:24.305060 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 22:23:24.305129 kernel: AES CTR mode by8 optimization enabled Feb 12 22:23:24.305146 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 12 22:23:24.305353 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 22:23:24.307043 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:cf:1a:20:fd:e7 Feb 12 22:23:24.314046 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 12 22:23:24.317044 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 22:23:24.317105 kernel: GPT:9289727 != 16777215 Feb 12 22:23:24.317126 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 22:23:24.317144 kernel: GPT:9289727 != 16777215 Feb 12 22:23:24.317161 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 22:23:24.317179 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:23:24.320017 (udev-worker)[438]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:23:24.462903 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (431) Feb 12 22:23:24.445311 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 22:23:24.500828 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 22:23:24.515305 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:23:24.550405 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 22:23:24.551759 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 22:23:24.556193 systemd[1]: Starting disk-uuid.service... Feb 12 22:23:24.566306 disk-uuid[595]: Primary Header is updated. Feb 12 22:23:24.566306 disk-uuid[595]: Secondary Entries is updated. Feb 12 22:23:24.566306 disk-uuid[595]: Secondary Header is updated. Feb 12 22:23:24.573065 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:23:24.583058 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:23:25.592051 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:23:25.592382 disk-uuid[596]: The operation has completed successfully. Feb 12 22:23:25.710060 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 22:23:25.710256 systemd[1]: Finished disk-uuid.service. Feb 12 22:23:25.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:25.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:25.722405 systemd[1]: Starting verity-setup.service... Feb 12 22:23:25.751043 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 22:23:25.895229 systemd[1]: Found device dev-mapper-usr.device. Feb 12 22:23:25.903845 systemd[1]: Mounting sysusr-usr.mount... Feb 12 22:23:25.911710 systemd[1]: Finished verity-setup.service. Feb 12 22:23:25.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:26.033457 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 22:23:26.034118 systemd[1]: Mounted sysusr-usr.mount. Feb 12 22:23:26.037218 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 22:23:26.040188 systemd[1]: Starting ignition-setup.service... Feb 12 22:23:26.042983 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 22:23:26.063721 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:23:26.063778 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:23:26.063790 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:23:26.072047 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:23:26.085364 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 22:23:26.161860 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 22:23:26.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:26.166000 audit: BPF prog-id=9 op=LOAD Feb 12 22:23:26.166743 systemd[1]: Starting systemd-networkd.service... Feb 12 22:23:26.199112 systemd-networkd[1106]: lo: Link UP Feb 12 22:23:26.199123 systemd-networkd[1106]: lo: Gained carrier Feb 12 22:23:26.202495 systemd-networkd[1106]: Enumeration completed Feb 12 22:23:26.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:26.202800 systemd-networkd[1106]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:23:26.202947 systemd[1]: Started systemd-networkd.service. Feb 12 22:23:26.204087 systemd[1]: Reached target network.target. Feb 12 22:23:26.206187 systemd[1]: Starting iscsiuio.service... Feb 12 22:23:26.214518 systemd-networkd[1106]: eth0: Link UP Feb 12 22:23:26.215936 systemd-networkd[1106]: eth0: Gained carrier Feb 12 22:23:26.216389 systemd[1]: Started iscsiuio.service. Feb 12 22:23:26.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:26.220882 systemd[1]: Starting iscsid.service... Feb 12 22:23:26.228508 systemd[1]: Finished ignition-setup.service. Feb 12 22:23:26.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:26.231616 iscsid[1112]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:23:26.231616 iscsid[1112]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 22:23:26.231616 iscsid[1112]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 22:23:26.231616 iscsid[1112]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 22:23:26.231616 iscsid[1112]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 22:23:26.231616 iscsid[1112]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:23:26.231616 iscsid[1112]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 22:23:26.241716 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 22:23:26.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:26.242205 systemd-networkd[1106]: eth0: DHCPv4 address 172.31.23.13/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 22:23:26.261061 systemd[1]: Started iscsid.service. Feb 12 22:23:26.264993 systemd[1]: Starting dracut-initqueue.service... Feb 12 22:23:26.282154 systemd[1]: Finished dracut-initqueue.service. Feb 12 22:23:26.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:26.283510 systemd[1]: Reached target remote-fs-pre.target. Feb 12 22:23:26.287125 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:23:26.288972 systemd[1]: Reached target remote-fs.target. Feb 12 22:23:26.292276 systemd[1]: Starting dracut-pre-mount.service... Feb 12 22:23:26.304580 systemd[1]: Finished dracut-pre-mount.service. Feb 12 22:23:26.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.146335 ignition[1113]: Ignition 2.14.0 Feb 12 22:23:27.146352 ignition[1113]: Stage: fetch-offline Feb 12 22:23:27.146490 ignition[1113]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:23:27.146546 ignition[1113]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:23:27.165063 ignition[1113]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:23:27.166618 ignition[1113]: Ignition finished successfully Feb 12 22:23:27.179057 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 12 22:23:27.179456 kernel: audit: type=1130 audit(1707776607.170:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.169228 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 22:23:27.172832 systemd[1]: Starting ignition-fetch.service... Feb 12 22:23:27.188204 ignition[1132]: Ignition 2.14.0 Feb 12 22:23:27.188216 ignition[1132]: Stage: fetch Feb 12 22:23:27.188513 ignition[1132]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:23:27.188544 ignition[1132]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:23:27.198764 ignition[1132]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:23:27.200415 ignition[1132]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:23:27.211958 ignition[1132]: INFO : PUT result: OK Feb 12 22:23:27.214908 ignition[1132]: DEBUG : parsed url from cmdline: "" Feb 12 22:23:27.216099 ignition[1132]: INFO : no config URL provided Feb 12 22:23:27.217242 ignition[1132]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 12 22:23:27.218847 ignition[1132]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 12 22:23:27.220093 ignition[1132]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:23:27.222017 ignition[1132]: INFO : PUT result: OK Feb 12 22:23:27.222017 ignition[1132]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 12 22:23:27.224257 ignition[1132]: INFO : GET result: OK Feb 12 22:23:27.224257 ignition[1132]: DEBUG : parsing config with SHA512: 2f55a868a4785f41303b33641e77d58009ae014e4a68b73b97bc1e66d39e55072508bd5f5e49c705a041ea692f68f221666fca22276359c11615953388a4f3f2 Feb 12 22:23:27.242007 unknown[1132]: fetched base config from "system" Feb 12 22:23:27.242043 unknown[1132]: fetched base config from "system" Feb 12 22:23:27.242871 ignition[1132]: fetch: fetch complete Feb 12 22:23:27.242052 unknown[1132]: fetched user config from "aws" Feb 12 22:23:27.242878 ignition[1132]: fetch: fetch passed Feb 12 22:23:27.247371 systemd[1]: Finished ignition-fetch.service. Feb 12 22:23:27.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.242927 ignition[1132]: Ignition finished successfully Feb 12 22:23:27.257386 kernel: audit: type=1130 audit(1707776607.248:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.249955 systemd[1]: Starting ignition-kargs.service... Feb 12 22:23:27.267421 ignition[1138]: Ignition 2.14.0 Feb 12 22:23:27.267433 ignition[1138]: Stage: kargs Feb 12 22:23:27.267630 ignition[1138]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:23:27.267663 ignition[1138]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:23:27.275893 ignition[1138]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:23:27.277486 ignition[1138]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:23:27.283754 ignition[1138]: INFO : PUT result: OK Feb 12 22:23:27.287243 ignition[1138]: kargs: kargs passed Feb 12 22:23:27.287313 ignition[1138]: Ignition finished successfully Feb 12 22:23:27.288572 systemd[1]: Finished ignition-kargs.service. Feb 12 22:23:27.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.292441 systemd[1]: Starting ignition-disks.service... Feb 12 22:23:27.297946 kernel: audit: type=1130 audit(1707776607.291:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.303126 ignition[1144]: Ignition 2.14.0 Feb 12 22:23:27.303138 ignition[1144]: Stage: disks Feb 12 22:23:27.303347 ignition[1144]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:23:27.303379 ignition[1144]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:23:27.312093 ignition[1144]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:23:27.313472 ignition[1144]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:23:27.314827 ignition[1144]: INFO : PUT result: OK Feb 12 22:23:27.317853 ignition[1144]: disks: disks passed Feb 12 22:23:27.317913 ignition[1144]: Ignition finished successfully Feb 12 22:23:27.320731 systemd[1]: Finished ignition-disks.service. Feb 12 22:23:27.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.328818 kernel: audit: type=1130 audit(1707776607.321:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.321895 systemd[1]: Reached target initrd-root-device.target. Feb 12 22:23:27.327869 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:23:27.328831 systemd[1]: Reached target local-fs.target. Feb 12 22:23:27.329754 systemd[1]: Reached target sysinit.target. Feb 12 22:23:27.330207 systemd[1]: Reached target basic.target. Feb 12 22:23:27.331286 systemd[1]: Starting systemd-fsck-root.service... Feb 12 22:23:27.366849 systemd-fsck[1152]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 22:23:27.372814 systemd[1]: Finished systemd-fsck-root.service. Feb 12 22:23:27.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.375119 systemd[1]: Mounting sysroot.mount... Feb 12 22:23:27.384463 kernel: audit: type=1130 audit(1707776607.374:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.396071 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 22:23:27.396712 systemd[1]: Mounted sysroot.mount. Feb 12 22:23:27.397837 systemd[1]: Reached target initrd-root-fs.target. Feb 12 22:23:27.409382 systemd[1]: Mounting sysroot-usr.mount... Feb 12 22:23:27.411701 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 22:23:27.411780 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 22:23:27.411810 systemd[1]: Reached target ignition-diskful.target. Feb 12 22:23:27.440281 systemd[1]: Mounted sysroot-usr.mount. Feb 12 22:23:27.444486 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:23:27.448798 systemd[1]: Starting initrd-setup-root.service... Feb 12 22:23:27.462201 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1169) Feb 12 22:23:27.466327 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:23:27.466390 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:23:27.466409 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:23:27.468248 initrd-setup-root[1174]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 22:23:27.475056 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:23:27.477845 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:23:27.495871 initrd-setup-root[1200]: cut: /sysroot/etc/group: No such file or directory Feb 12 22:23:27.502867 initrd-setup-root[1208]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 22:23:27.509220 initrd-setup-root[1216]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 22:23:27.738132 systemd[1]: Finished initrd-setup-root.service. Feb 12 22:23:27.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.740486 systemd[1]: Starting ignition-mount.service... Feb 12 22:23:27.754792 kernel: audit: type=1130 audit(1707776607.739:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.748057 systemd[1]: Starting sysroot-boot.service... Feb 12 22:23:27.754654 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 22:23:27.754780 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 22:23:27.792856 ignition[1235]: INFO : Ignition 2.14.0 Feb 12 22:23:27.792856 ignition[1235]: INFO : Stage: mount Feb 12 22:23:27.795139 ignition[1235]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:23:27.795139 ignition[1235]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:23:27.808820 systemd[1]: Finished sysroot-boot.service. Feb 12 22:23:27.819900 kernel: audit: type=1130 audit(1707776607.810:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.831545 ignition[1235]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:23:27.834238 ignition[1235]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:23:27.837502 ignition[1235]: INFO : PUT result: OK Feb 12 22:23:27.841505 ignition[1235]: INFO : mount: mount passed Feb 12 22:23:27.844033 ignition[1235]: INFO : Ignition finished successfully Feb 12 22:23:27.844669 systemd[1]: Finished ignition-mount.service. Feb 12 22:23:27.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.848407 systemd[1]: Starting ignition-files.service... Feb 12 22:23:27.858317 kernel: audit: type=1130 audit(1707776607.847:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:27.860205 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:23:27.877062 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1244) Feb 12 22:23:27.882241 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:23:27.882315 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:23:27.882347 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:23:27.891051 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:23:27.895722 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:23:27.913249 ignition[1263]: INFO : Ignition 2.14.0 Feb 12 22:23:27.916456 ignition[1263]: INFO : Stage: files Feb 12 22:23:27.916456 ignition[1263]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:23:27.916456 ignition[1263]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:23:27.934281 ignition[1263]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:23:27.937744 ignition[1263]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:23:27.940119 ignition[1263]: INFO : PUT result: OK Feb 12 22:23:27.947275 ignition[1263]: DEBUG : files: compiled without relabeling support, skipping Feb 12 22:23:27.954982 ignition[1263]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 22:23:27.954982 ignition[1263]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 22:23:27.965252 systemd-networkd[1106]: eth0: Gained IPv6LL Feb 12 22:23:27.973212 ignition[1263]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 22:23:27.976927 ignition[1263]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 22:23:27.976927 ignition[1263]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 22:23:27.976397 unknown[1263]: wrote ssh authorized keys file for user: core Feb 12 22:23:27.984319 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 22:23:27.984319 ignition[1263]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 22:23:28.719438 ignition[1263]: INFO : GET result: OK Feb 12 22:23:28.948557 ignition[1263]: DEBUG : file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 22:23:28.952195 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 22:23:28.952195 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 22:23:28.952195 ignition[1263]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 22:23:29.340365 ignition[1263]: INFO : GET result: OK Feb 12 22:23:29.482978 ignition[1263]: DEBUG : file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 22:23:29.488608 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 22:23:29.488608 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 22:23:29.501278 ignition[1263]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:23:29.505806 ignition[1263]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem90444604" Feb 12 22:23:29.510348 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1266) Feb 12 22:23:29.510380 ignition[1263]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem90444604": device or resource busy Feb 12 22:23:29.510380 ignition[1263]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem90444604", trying btrfs: device or resource busy Feb 12 22:23:29.510380 ignition[1263]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem90444604" Feb 12 22:23:29.520251 ignition[1263]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem90444604" Feb 12 22:23:29.530211 ignition[1263]: INFO : op(3): [started] unmounting "/mnt/oem90444604" Feb 12 22:23:29.531775 ignition[1263]: INFO : op(3): [finished] unmounting "/mnt/oem90444604" Feb 12 22:23:29.531775 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 22:23:29.531775 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:23:29.531775 ignition[1263]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 22:23:29.539897 systemd[1]: mnt-oem90444604.mount: Deactivated successfully. Feb 12 22:23:29.638550 ignition[1263]: INFO : GET result: OK Feb 12 22:23:29.925695 ignition[1263]: DEBUG : file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 22:23:29.928440 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:23:29.928440 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:23:29.928440 ignition[1263]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 22:23:29.989590 ignition[1263]: INFO : GET result: OK Feb 12 22:23:30.744701 ignition[1263]: DEBUG : file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 22:23:30.747738 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:23:30.747738 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/install.sh" Feb 12 22:23:30.747738 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 22:23:30.747738 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:23:30.756287 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:23:30.758181 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:23:30.760376 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:23:30.763054 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 22:23:30.767938 ignition[1263]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:23:30.772808 ignition[1263]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3187840875" Feb 12 22:23:30.774876 ignition[1263]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3187840875": device or resource busy Feb 12 22:23:30.774876 ignition[1263]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3187840875", trying btrfs: device or resource busy Feb 12 22:23:30.774876 ignition[1263]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3187840875" Feb 12 22:23:30.784131 ignition[1263]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3187840875" Feb 12 22:23:30.784131 ignition[1263]: INFO : op(6): [started] unmounting "/mnt/oem3187840875" Feb 12 22:23:30.784131 ignition[1263]: INFO : op(6): [finished] unmounting "/mnt/oem3187840875" Feb 12 22:23:30.784131 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 22:23:30.784131 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 22:23:30.784131 ignition[1263]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:23:30.802666 systemd[1]: mnt-oem3187840875.mount: Deactivated successfully. Feb 12 22:23:30.830157 ignition[1263]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3698562716" Feb 12 22:23:30.836148 ignition[1263]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3698562716": device or resource busy Feb 12 22:23:30.836148 ignition[1263]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3698562716", trying btrfs: device or resource busy Feb 12 22:23:30.836148 ignition[1263]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3698562716" Feb 12 22:23:30.849979 ignition[1263]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3698562716" Feb 12 22:23:30.853819 ignition[1263]: INFO : op(9): [started] unmounting "/mnt/oem3698562716" Feb 12 22:23:30.856063 systemd[1]: mnt-oem3698562716.mount: Deactivated successfully. Feb 12 22:23:30.857391 ignition[1263]: INFO : op(9): [finished] unmounting "/mnt/oem3698562716" Feb 12 22:23:30.858972 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 22:23:30.873249 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 22:23:30.873249 ignition[1263]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:23:30.890742 ignition[1263]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3479595996" Feb 12 22:23:30.893410 ignition[1263]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3479595996": device or resource busy Feb 12 22:23:30.893410 ignition[1263]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3479595996", trying btrfs: device or resource busy Feb 12 22:23:30.893410 ignition[1263]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3479595996" Feb 12 22:23:30.906298 ignition[1263]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3479595996" Feb 12 22:23:30.908877 ignition[1263]: INFO : op(c): [started] unmounting "/mnt/oem3479595996" Feb 12 22:23:30.908877 ignition[1263]: INFO : op(c): [finished] unmounting "/mnt/oem3479595996" Feb 12 22:23:30.908877 ignition[1263]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 22:23:30.908877 ignition[1263]: INFO : files: op(e): [started] processing unit "nvidia.service" Feb 12 22:23:30.908877 ignition[1263]: INFO : files: op(e): [finished] processing unit "nvidia.service" Feb 12 22:23:30.908877 ignition[1263]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 22:23:30.908877 ignition[1263]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 22:23:30.908877 ignition[1263]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Feb 12 22:23:30.908877 ignition[1263]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(12): [started] processing unit "prepare-critools.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(12): op(13): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(12): op(13): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(12): [finished] processing unit "prepare-critools.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(16): [started] setting preset to enabled for "prepare-critools.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(19): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(19): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 22:23:30.927510 ignition[1263]: INFO : files: op(1a): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 22:23:30.993253 kernel: audit: type=1130 audit(1707776610.937:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:30.993287 kernel: audit: type=1130 audit(1707776610.973:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:30.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:30.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:30.993410 ignition[1263]: INFO : files: op(1a): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 22:23:30.993410 ignition[1263]: INFO : files: createResultFile: createFiles: op(1b): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:23:30.993410 ignition[1263]: INFO : files: createResultFile: createFiles: op(1b): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:23:30.993410 ignition[1263]: INFO : files: files passed Feb 12 22:23:30.993410 ignition[1263]: INFO : Ignition finished successfully Feb 12 22:23:30.935316 systemd[1]: Finished ignition-files.service. Feb 12 22:23:31.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:30.941981 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 22:23:30.955228 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 22:23:31.022222 initrd-setup-root-after-ignition[1286]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 22:23:30.969338 systemd[1]: Starting ignition-quench.service... Feb 12 22:23:30.971839 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 22:23:30.975192 systemd[1]: Reached target ignition-complete.target. Feb 12 22:23:30.992405 systemd[1]: Starting initrd-parse-etc.service... Feb 12 22:23:31.015819 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 22:23:31.016069 systemd[1]: Finished ignition-quench.service. Feb 12 22:23:31.034282 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 22:23:31.034407 systemd[1]: Finished initrd-parse-etc.service. Feb 12 22:23:31.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.036757 systemd[1]: Reached target initrd-fs.target. Feb 12 22:23:31.039017 systemd[1]: Reached target initrd.target. Feb 12 22:23:31.039907 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 22:23:31.041075 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 22:23:31.058385 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 22:23:31.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.060670 systemd[1]: Starting initrd-cleanup.service... Feb 12 22:23:31.073011 systemd[1]: Stopped target nss-lookup.target. Feb 12 22:23:31.074897 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 22:23:31.078126 systemd[1]: Stopped target timers.target. Feb 12 22:23:31.080091 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 22:23:31.081217 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 22:23:31.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.084126 systemd[1]: Stopped target initrd.target. Feb 12 22:23:31.086924 systemd[1]: Stopped target basic.target. Feb 12 22:23:31.089507 systemd[1]: Stopped target ignition-complete.target. Feb 12 22:23:31.092144 systemd[1]: Stopped target ignition-diskful.target. Feb 12 22:23:31.095097 systemd[1]: Stopped target initrd-root-device.target. Feb 12 22:23:31.099015 systemd[1]: Stopped target remote-fs.target. Feb 12 22:23:31.101076 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 22:23:31.103644 systemd[1]: Stopped target sysinit.target. Feb 12 22:23:31.105494 systemd[1]: Stopped target local-fs.target. Feb 12 22:23:31.107893 systemd[1]: Stopped target local-fs-pre.target. Feb 12 22:23:31.109996 systemd[1]: Stopped target swap.target. Feb 12 22:23:31.111763 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 22:23:31.112914 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 22:23:31.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.121607 systemd[1]: Stopped target cryptsetup.target. Feb 12 22:23:31.124394 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 22:23:31.125948 systemd[1]: Stopped dracut-initqueue.service. Feb 12 22:23:31.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.130551 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 22:23:31.132380 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 22:23:31.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.135164 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 22:23:31.136697 systemd[1]: Stopped ignition-files.service. Feb 12 22:23:31.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.140382 systemd[1]: Stopping ignition-mount.service... Feb 12 22:23:31.142939 systemd[1]: Stopping iscsiuio.service... Feb 12 22:23:31.145711 systemd[1]: Stopping sysroot-boot.service... Feb 12 22:23:31.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.147372 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 22:23:31.147655 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 22:23:31.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.149416 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 22:23:31.171255 ignition[1301]: INFO : Ignition 2.14.0 Feb 12 22:23:31.171255 ignition[1301]: INFO : Stage: umount Feb 12 22:23:31.171255 ignition[1301]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:23:31.171255 ignition[1301]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:23:31.149688 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 22:23:31.156412 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 22:23:31.156550 systemd[1]: Stopped iscsiuio.service. Feb 12 22:23:31.163573 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 22:23:31.163818 systemd[1]: Finished initrd-cleanup.service. Feb 12 22:23:31.197905 ignition[1301]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:23:31.199490 ignition[1301]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:23:31.200922 ignition[1301]: INFO : PUT result: OK Feb 12 22:23:31.205986 ignition[1301]: INFO : umount: umount passed Feb 12 22:23:31.207091 ignition[1301]: INFO : Ignition finished successfully Feb 12 22:23:31.208840 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 22:23:31.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.208961 systemd[1]: Stopped ignition-mount.service. Feb 12 22:23:31.210058 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 22:23:31.210114 systemd[1]: Stopped ignition-disks.service. Feb 12 22:23:31.211119 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 22:23:31.211172 systemd[1]: Stopped ignition-kargs.service. Feb 12 22:23:31.212493 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 22:23:31.212541 systemd[1]: Stopped ignition-fetch.service. Feb 12 22:23:31.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.224343 systemd[1]: Stopped target network.target. Feb 12 22:23:31.225640 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 22:23:31.225719 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 22:23:31.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.229738 systemd[1]: Stopped target paths.target. Feb 12 22:23:31.230380 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 22:23:31.230551 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 22:23:31.235512 systemd[1]: Stopped target slices.target. Feb 12 22:23:31.236553 systemd[1]: Stopped target sockets.target. Feb 12 22:23:31.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.237443 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 22:23:31.237476 systemd[1]: Closed iscsid.socket. Feb 12 22:23:31.238288 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 22:23:31.238360 systemd[1]: Closed iscsiuio.socket. Feb 12 22:23:31.242117 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 22:23:31.242171 systemd[1]: Stopped ignition-setup.service. Feb 12 22:23:31.244543 systemd[1]: Stopping systemd-networkd.service... Feb 12 22:23:31.249915 systemd[1]: Stopping systemd-resolved.service... Feb 12 22:23:31.262542 systemd-networkd[1106]: eth0: DHCPv6 lease lost Feb 12 22:23:31.265206 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 22:23:31.266372 systemd[1]: Stopped systemd-networkd.service. Feb 12 22:23:31.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.272000 audit: BPF prog-id=9 op=UNLOAD Feb 12 22:23:31.270039 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 22:23:31.275000 audit: BPF prog-id=6 op=UNLOAD Feb 12 22:23:31.270166 systemd[1]: Stopped systemd-resolved.service. Feb 12 22:23:31.272464 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 22:23:31.272510 systemd[1]: Closed systemd-networkd.socket. Feb 12 22:23:31.278163 systemd[1]: Stopping network-cleanup.service... Feb 12 22:23:31.281834 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 22:23:31.281917 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 22:23:31.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.285946 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 22:23:31.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.286005 systemd[1]: Stopped systemd-sysctl.service. Feb 12 22:23:31.290741 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 22:23:31.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.290805 systemd[1]: Stopped systemd-modules-load.service. Feb 12 22:23:31.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.291483 systemd[1]: Stopping systemd-udevd.service... Feb 12 22:23:31.292222 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 22:23:31.292330 systemd[1]: Stopped sysroot-boot.service. Feb 12 22:23:31.296756 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 22:23:31.296815 systemd[1]: Stopped initrd-setup-root.service. Feb 12 22:23:31.302269 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 22:23:31.302528 systemd[1]: Stopped network-cleanup.service. Feb 12 22:23:31.313968 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 22:23:31.314334 systemd[1]: Stopped systemd-udevd.service. Feb 12 22:23:31.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.317988 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 22:23:31.318071 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 22:23:31.321264 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 22:23:31.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.321309 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 22:23:31.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.323121 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 22:23:31.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.323184 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 22:23:31.325608 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 22:23:31.325653 systemd[1]: Stopped dracut-cmdline.service. Feb 12 22:23:31.326912 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 22:23:31.326961 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 22:23:31.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.338907 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 22:23:31.340444 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 22:23:31.340522 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 22:23:31.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:31.342431 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 22:23:31.342488 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 22:23:31.343722 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 22:23:31.343862 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 22:23:31.350107 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 22:23:31.350235 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 22:23:31.353960 systemd[1]: Reached target initrd-switch-root.target. Feb 12 22:23:31.359561 systemd[1]: Starting initrd-switch-root.service... Feb 12 22:23:31.377236 systemd[1]: Switching root. Feb 12 22:23:31.403138 iscsid[1112]: iscsid shutting down. Feb 12 22:23:31.404448 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Feb 12 22:23:31.404525 systemd-journald[185]: Journal stopped Feb 12 22:23:39.529422 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 22:23:39.529500 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 22:23:39.529520 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 22:23:39.529537 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 22:23:39.529558 kernel: SELinux: policy capability open_perms=1 Feb 12 22:23:39.529575 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 22:23:39.529592 kernel: SELinux: policy capability always_check_network=0 Feb 12 22:23:39.529609 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 22:23:39.529626 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 22:23:39.529645 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 22:23:39.529663 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 22:23:39.529748 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 12 22:23:39.529772 kernel: audit: type=1403 audit(1707776612.575:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 22:23:39.529796 systemd[1]: Successfully loaded SELinux policy in 107.117ms. Feb 12 22:23:39.529822 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.980ms. Feb 12 22:23:39.529843 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:23:39.529862 systemd[1]: Detected virtualization amazon. Feb 12 22:23:39.529880 systemd[1]: Detected architecture x86-64. Feb 12 22:23:39.529902 systemd[1]: Detected first boot. Feb 12 22:23:39.529921 systemd[1]: Initializing machine ID from VM UUID. Feb 12 22:23:39.531420 kernel: audit: type=1400 audit(1707776612.822:80): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:23:39.531455 kernel: audit: type=1400 audit(1707776612.822:81): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:23:39.531473 kernel: audit: type=1334 audit(1707776612.830:82): prog-id=10 op=LOAD Feb 12 22:23:39.532685 kernel: audit: type=1334 audit(1707776612.830:83): prog-id=10 op=UNLOAD Feb 12 22:23:39.532716 kernel: audit: type=1334 audit(1707776612.835:84): prog-id=11 op=LOAD Feb 12 22:23:39.532742 kernel: audit: type=1334 audit(1707776612.835:85): prog-id=11 op=UNLOAD Feb 12 22:23:39.532766 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 22:23:39.532788 kernel: audit: type=1400 audit(1707776613.251:86): avc: denied { associate } for pid=1334 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 22:23:39.532809 kernel: audit: type=1300 audit(1707776613.251:86): arch=c000003e syscall=188 success=yes exit=0 a0=c0000242fc a1=c00002a3d8 a2=c000029240 a3=32 items=0 ppid=1317 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:39.532830 kernel: audit: type=1327 audit(1707776613.251:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:23:39.532851 systemd[1]: Populated /etc with preset unit settings. Feb 12 22:23:39.532874 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:23:39.532897 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:23:39.532919 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:23:39.532938 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 12 22:23:39.532957 kernel: audit: type=1334 audit(1707776619.207:88): prog-id=12 op=LOAD Feb 12 22:23:39.533051 kernel: audit: type=1334 audit(1707776619.207:89): prog-id=3 op=UNLOAD Feb 12 22:23:39.533077 kernel: audit: type=1334 audit(1707776619.210:90): prog-id=13 op=LOAD Feb 12 22:23:39.533098 kernel: audit: type=1334 audit(1707776619.211:91): prog-id=14 op=LOAD Feb 12 22:23:39.533117 kernel: audit: type=1334 audit(1707776619.211:92): prog-id=4 op=UNLOAD Feb 12 22:23:39.533135 kernel: audit: type=1334 audit(1707776619.211:93): prog-id=5 op=UNLOAD Feb 12 22:23:39.533155 kernel: audit: type=1334 audit(1707776619.215:94): prog-id=15 op=LOAD Feb 12 22:23:39.533173 kernel: audit: type=1334 audit(1707776619.215:95): prog-id=12 op=UNLOAD Feb 12 22:23:39.533191 kernel: audit: type=1334 audit(1707776619.216:96): prog-id=16 op=LOAD Feb 12 22:23:39.533209 kernel: audit: type=1334 audit(1707776619.218:97): prog-id=17 op=LOAD Feb 12 22:23:39.533231 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 22:23:39.533251 systemd[1]: Stopped iscsid.service. Feb 12 22:23:39.533270 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 22:23:39.533291 systemd[1]: Stopped initrd-switch-root.service. Feb 12 22:23:39.533312 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 22:23:39.533333 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 22:23:39.533371 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 22:23:39.533392 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 22:23:39.533412 systemd[1]: Created slice system-getty.slice. Feb 12 22:23:39.533436 systemd[1]: Created slice system-modprobe.slice. Feb 12 22:23:39.533456 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 22:23:39.533475 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 22:23:39.533496 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 22:23:39.533517 systemd[1]: Created slice user.slice. Feb 12 22:23:39.533538 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:23:39.533558 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 22:23:39.533578 systemd[1]: Set up automount boot.automount. Feb 12 22:23:39.533598 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 22:23:39.533623 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 22:23:39.533641 systemd[1]: Stopped target initrd-fs.target. Feb 12 22:23:39.533659 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 22:23:39.533675 systemd[1]: Reached target integritysetup.target. Feb 12 22:23:39.533692 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:23:39.533710 systemd[1]: Reached target remote-fs.target. Feb 12 22:23:39.533743 systemd[1]: Reached target slices.target. Feb 12 22:23:39.533768 systemd[1]: Reached target swap.target. Feb 12 22:23:39.533786 systemd[1]: Reached target torcx.target. Feb 12 22:23:39.533803 systemd[1]: Reached target veritysetup.target. Feb 12 22:23:39.533823 systemd[1]: Listening on systemd-coredump.socket. Feb 12 22:23:39.533843 systemd[1]: Listening on systemd-initctl.socket. Feb 12 22:23:39.533861 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:23:39.533893 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:23:39.533913 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:23:39.533935 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 22:23:39.533953 systemd[1]: Mounting dev-hugepages.mount... Feb 12 22:23:39.533974 systemd[1]: Mounting dev-mqueue.mount... Feb 12 22:23:39.533995 systemd[1]: Mounting media.mount... Feb 12 22:23:39.534016 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:23:39.534055 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 22:23:39.534074 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 22:23:39.534092 systemd[1]: Mounting tmp.mount... Feb 12 22:23:39.534111 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 22:23:39.534134 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 22:23:39.534152 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:23:39.534170 systemd[1]: Starting modprobe@configfs.service... Feb 12 22:23:39.534189 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 22:23:39.534209 systemd[1]: Starting modprobe@drm.service... Feb 12 22:23:39.534227 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 22:23:39.534247 systemd[1]: Starting modprobe@fuse.service... Feb 12 22:23:39.534265 systemd[1]: Starting modprobe@loop.service... Feb 12 22:23:39.534284 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 22:23:39.534306 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 22:23:39.534324 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 22:23:39.534342 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 22:23:39.534361 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 22:23:39.534379 systemd[1]: Stopped systemd-journald.service. Feb 12 22:23:39.534398 systemd[1]: Starting systemd-journald.service... Feb 12 22:23:39.534417 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:23:39.534435 systemd[1]: Starting systemd-network-generator.service... Feb 12 22:23:39.534455 systemd[1]: Starting systemd-remount-fs.service... Feb 12 22:23:39.534476 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:23:39.534496 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 22:23:39.534515 systemd[1]: Stopped verity-setup.service. Feb 12 22:23:39.534535 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:23:39.534553 systemd[1]: Mounted dev-hugepages.mount. Feb 12 22:23:39.534572 systemd[1]: Mounted dev-mqueue.mount. Feb 12 22:23:39.534590 systemd[1]: Mounted media.mount. Feb 12 22:23:39.534608 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 22:23:39.534627 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 22:23:39.534648 systemd[1]: Mounted tmp.mount. Feb 12 22:23:39.534668 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:23:39.534687 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 22:23:39.534705 systemd[1]: Finished modprobe@configfs.service. Feb 12 22:23:39.534725 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 22:23:39.534746 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 22:23:39.534765 kernel: loop: module loaded Feb 12 22:23:39.534784 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 22:23:39.534803 systemd[1]: Finished modprobe@drm.service. Feb 12 22:23:39.534823 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 22:23:39.534845 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 22:23:39.534864 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 22:23:39.534884 systemd[1]: Finished modprobe@loop.service. Feb 12 22:23:39.534902 systemd[1]: Finished systemd-network-generator.service. Feb 12 22:23:39.534927 systemd-journald[1406]: Journal started Feb 12 22:23:39.535000 systemd-journald[1406]: Runtime Journal (/run/log/journal/ec281b02dd70efca2db94a6aeb942127) is 4.8M, max 38.7M, 33.9M free. Feb 12 22:23:32.575000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 22:23:32.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:23:32.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:23:32.830000 audit: BPF prog-id=10 op=LOAD Feb 12 22:23:32.830000 audit: BPF prog-id=10 op=UNLOAD Feb 12 22:23:32.835000 audit: BPF prog-id=11 op=LOAD Feb 12 22:23:32.835000 audit: BPF prog-id=11 op=UNLOAD Feb 12 22:23:33.251000 audit[1334]: AVC avc: denied { associate } for pid=1334 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 22:23:33.251000 audit[1334]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0000242fc a1=c00002a3d8 a2=c000029240 a3=32 items=0 ppid=1317 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:33.251000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:23:33.257000 audit[1334]: AVC avc: denied { associate } for pid=1334 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 22:23:39.540606 kernel: fuse: init (API version 7.34) Feb 12 22:23:39.540671 systemd[1]: Started systemd-journald.service. Feb 12 22:23:33.257000 audit[1334]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000243d5 a2=1ed a3=0 items=2 ppid=1317 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:33.257000 audit: CWD cwd="/" Feb 12 22:23:33.257000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:33.257000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:33.257000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:23:39.207000 audit: BPF prog-id=12 op=LOAD Feb 12 22:23:39.207000 audit: BPF prog-id=3 op=UNLOAD Feb 12 22:23:39.210000 audit: BPF prog-id=13 op=LOAD Feb 12 22:23:39.211000 audit: BPF prog-id=14 op=LOAD Feb 12 22:23:39.211000 audit: BPF prog-id=4 op=UNLOAD Feb 12 22:23:39.211000 audit: BPF prog-id=5 op=UNLOAD Feb 12 22:23:39.215000 audit: BPF prog-id=15 op=LOAD Feb 12 22:23:39.215000 audit: BPF prog-id=12 op=UNLOAD Feb 12 22:23:39.216000 audit: BPF prog-id=16 op=LOAD Feb 12 22:23:39.218000 audit: BPF prog-id=17 op=LOAD Feb 12 22:23:39.218000 audit: BPF prog-id=13 op=UNLOAD Feb 12 22:23:39.218000 audit: BPF prog-id=14 op=UNLOAD Feb 12 22:23:39.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.231000 audit: BPF prog-id=15 op=UNLOAD Feb 12 22:23:39.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.434000 audit: BPF prog-id=18 op=LOAD Feb 12 22:23:39.434000 audit: BPF prog-id=19 op=LOAD Feb 12 22:23:39.434000 audit: BPF prog-id=20 op=LOAD Feb 12 22:23:39.434000 audit: BPF prog-id=16 op=UNLOAD Feb 12 22:23:39.434000 audit: BPF prog-id=17 op=UNLOAD Feb 12 22:23:39.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.521000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 22:23:39.521000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffcac6b9580 a2=4000 a3=7ffcac6b961c items=0 ppid=1 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:39.521000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 22:23:39.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:33.228440 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:23:39.204079 systemd[1]: Queued start job for default target multi-user.target. Feb 12 22:23:33.229115 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:23:39.219320 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 22:23:33.229137 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:23:39.541583 systemd[1]: Finished systemd-remount-fs.service. Feb 12 22:23:33.229178 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 22:23:39.543678 systemd[1]: Reached target network-pre.target. Feb 12 22:23:33.229240 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 22:23:39.548412 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 22:23:33.229280 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 22:23:39.549318 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 22:23:33.229295 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 22:23:33.229502 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 22:23:33.229556 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:23:33.229571 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:23:33.241132 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 22:23:33.241175 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 22:23:33.241204 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 22:23:33.241224 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 22:23:33.241243 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 22:23:33.241258 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 22:23:38.326497 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:23:38.326776 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:23:39.555434 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 22:23:38.326894 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:23:39.559553 systemd[1]: Starting systemd-journal-flush.service... Feb 12 22:23:38.327110 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:23:39.561187 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 22:23:39.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:38.327159 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 22:23:39.563156 systemd[1]: Starting systemd-random-seed.service... Feb 12 22:23:38.327215 /usr/lib/systemd/system-generators/torcx-generator[1334]: time="2024-02-12T22:23:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 22:23:39.565255 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 22:23:39.568218 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:23:39.569632 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 22:23:39.574198 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:23:39.584169 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 22:23:39.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.585552 systemd[1]: Finished modprobe@fuse.service. Feb 12 22:23:39.588682 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 22:23:39.595155 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 22:23:39.617949 systemd[1]: Finished systemd-random-seed.service. Feb 12 22:23:39.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.619394 systemd[1]: Reached target first-boot-complete.target. Feb 12 22:23:39.624154 systemd-journald[1406]: Time spent on flushing to /var/log/journal/ec281b02dd70efca2db94a6aeb942127 is 71.177ms for 1216 entries. Feb 12 22:23:39.624154 systemd-journald[1406]: System Journal (/var/log/journal/ec281b02dd70efca2db94a6aeb942127) is 8.0M, max 195.6M, 187.6M free. Feb 12 22:23:39.712211 systemd-journald[1406]: Received client request to flush runtime journal. Feb 12 22:23:39.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.635076 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:23:39.703178 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:23:39.706357 systemd[1]: Starting systemd-udev-settle.service... Feb 12 22:23:39.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.713455 systemd[1]: Finished systemd-journal-flush.service. Feb 12 22:23:39.724633 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 22:23:39.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.727579 systemd[1]: Starting systemd-sysusers.service... Feb 12 22:23:39.736633 udevadm[1443]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 22:23:39.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:39.945495 systemd[1]: Finished systemd-sysusers.service. Feb 12 22:23:39.948321 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:23:40.160135 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:23:40.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:40.699842 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 22:23:40.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:40.701000 audit: BPF prog-id=21 op=LOAD Feb 12 22:23:40.701000 audit: BPF prog-id=22 op=LOAD Feb 12 22:23:40.701000 audit: BPF prog-id=7 op=UNLOAD Feb 12 22:23:40.701000 audit: BPF prog-id=8 op=UNLOAD Feb 12 22:23:40.702648 systemd[1]: Starting systemd-udevd.service... Feb 12 22:23:40.724810 systemd-udevd[1453]: Using default interface naming scheme 'v252'. Feb 12 22:23:40.811430 systemd[1]: Started systemd-udevd.service. Feb 12 22:23:40.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:40.813000 audit: BPF prog-id=23 op=LOAD Feb 12 22:23:40.815608 systemd[1]: Starting systemd-networkd.service... Feb 12 22:23:40.842000 audit: BPF prog-id=24 op=LOAD Feb 12 22:23:40.842000 audit: BPF prog-id=25 op=LOAD Feb 12 22:23:40.842000 audit: BPF prog-id=26 op=LOAD Feb 12 22:23:40.844109 systemd[1]: Starting systemd-userdbd.service... Feb 12 22:23:40.894968 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 22:23:40.910435 systemd[1]: Started systemd-userdbd.service. Feb 12 22:23:40.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:40.912453 (udev-worker)[1467]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:23:41.003048 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 12 22:23:41.012869 kernel: ACPI: button: Power Button [PWRF] Feb 12 22:23:41.012966 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Feb 12 22:23:41.015106 kernel: ACPI: button: Sleep Button [SLPF] Feb 12 22:23:40.994000 audit[1463]: AVC avc: denied { confidentiality } for pid=1463 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 22:23:40.994000 audit[1463]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bdca20750 a1=32194 a2=7f2618c58bc5 a3=5 items=108 ppid=1453 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:40.994000 audit: CWD cwd="/" Feb 12 22:23:40.994000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=1 name=(null) inode=14868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=2 name=(null) inode=14868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=3 name=(null) inode=14869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=4 name=(null) inode=14868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=5 name=(null) inode=14870 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=6 name=(null) inode=14868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=7 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=8 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=9 name=(null) inode=14872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=10 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=11 name=(null) inode=14873 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=12 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=13 name=(null) inode=14874 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=14 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=15 name=(null) inode=14875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=16 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=17 name=(null) inode=14876 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=18 name=(null) inode=14868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=19 name=(null) inode=14877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=20 name=(null) inode=14877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=21 name=(null) inode=14878 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=22 name=(null) inode=14877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=23 name=(null) inode=14879 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=24 name=(null) inode=14877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=25 name=(null) inode=14880 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=26 name=(null) inode=14877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=27 name=(null) inode=14881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=28 name=(null) inode=14877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=29 name=(null) inode=14882 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=30 name=(null) inode=14868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=31 name=(null) inode=14883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=32 name=(null) inode=14883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=33 name=(null) inode=14884 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=34 name=(null) inode=14883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=35 name=(null) inode=14885 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=36 name=(null) inode=14883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=37 name=(null) inode=14886 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=38 name=(null) inode=14883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=39 name=(null) inode=14887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=40 name=(null) inode=14883 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=41 name=(null) inode=14888 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=42 name=(null) inode=14868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=43 name=(null) inode=14889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=44 name=(null) inode=14889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=45 name=(null) inode=14890 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=46 name=(null) inode=14889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=47 name=(null) inode=14891 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=48 name=(null) inode=14889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=49 name=(null) inode=14892 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=50 name=(null) inode=14889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=51 name=(null) inode=14893 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=52 name=(null) inode=14889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=53 name=(null) inode=14894 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=55 name=(null) inode=14895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=56 name=(null) inode=14895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=57 name=(null) inode=14896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=58 name=(null) inode=14895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=59 name=(null) inode=14897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=60 name=(null) inode=14895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=61 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=62 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=63 name=(null) inode=14899 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=64 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=65 name=(null) inode=14900 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=66 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=67 name=(null) inode=14901 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=68 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=69 name=(null) inode=14902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=70 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=71 name=(null) inode=14903 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=72 name=(null) inode=14895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=73 name=(null) inode=14904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=74 name=(null) inode=14904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=75 name=(null) inode=14905 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=76 name=(null) inode=14904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=77 name=(null) inode=14906 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=78 name=(null) inode=14904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=79 name=(null) inode=14907 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=80 name=(null) inode=14904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=81 name=(null) inode=14908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=82 name=(null) inode=14904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=83 name=(null) inode=14909 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=84 name=(null) inode=14895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=85 name=(null) inode=14910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=86 name=(null) inode=14910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=87 name=(null) inode=14911 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=88 name=(null) inode=14910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=89 name=(null) inode=14912 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=90 name=(null) inode=14910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=91 name=(null) inode=14913 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=92 name=(null) inode=14910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=93 name=(null) inode=14914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=94 name=(null) inode=14910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=95 name=(null) inode=14915 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=96 name=(null) inode=14895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=97 name=(null) inode=14916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=98 name=(null) inode=14916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=99 name=(null) inode=14917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=100 name=(null) inode=14916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=101 name=(null) inode=14918 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=102 name=(null) inode=14916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=103 name=(null) inode=14919 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=104 name=(null) inode=14916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=105 name=(null) inode=14920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=106 name=(null) inode=14916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PATH item=107 name=(null) inode=14921 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:40.994000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 22:23:41.046111 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Feb 12 22:23:41.058126 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 22:23:41.063052 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Feb 12 22:23:41.105047 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1456) Feb 12 22:23:41.121623 systemd-networkd[1459]: lo: Link UP Feb 12 22:23:41.121641 systemd-networkd[1459]: lo: Gained carrier Feb 12 22:23:41.122259 systemd-networkd[1459]: Enumeration completed Feb 12 22:23:41.122384 systemd[1]: Started systemd-networkd.service. Feb 12 22:23:41.122511 systemd-networkd[1459]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:23:41.133560 systemd-networkd[1459]: eth0: Link UP Feb 12 22:23:41.133743 systemd-networkd[1459]: eth0: Gained carrier Feb 12 22:23:41.134066 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:23:41.141221 systemd-networkd[1459]: eth0: DHCPv4 address 172.31.23.13/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 22:23:41.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:41.274512 systemd[1]: Finished systemd-udev-settle.service. Feb 12 22:23:41.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:41.282246 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:23:41.286047 systemd[1]: Starting lvm2-activation-early.service... Feb 12 22:23:41.290064 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 22:23:41.481551 lvm[1566]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:23:41.517425 systemd[1]: Finished lvm2-activation-early.service. Feb 12 22:23:41.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:41.518784 systemd[1]: Reached target cryptsetup.target. Feb 12 22:23:41.520932 systemd[1]: Starting lvm2-activation.service... Feb 12 22:23:41.526802 lvm[1568]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:23:41.558676 systemd[1]: Finished lvm2-activation.service. Feb 12 22:23:41.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:41.560012 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:23:41.561065 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 22:23:41.561101 systemd[1]: Reached target local-fs.target. Feb 12 22:23:41.562038 systemd[1]: Reached target machines.target. Feb 12 22:23:41.564486 systemd[1]: Starting ldconfig.service... Feb 12 22:23:41.566084 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 22:23:41.566195 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:23:41.567662 systemd[1]: Starting systemd-boot-update.service... Feb 12 22:23:41.570230 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 22:23:41.574036 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 22:23:41.576714 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:23:41.576800 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:23:41.578525 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 22:23:41.586870 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1570 (bootctl) Feb 12 22:23:41.590046 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 22:23:41.611074 systemd-tmpfiles[1573]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 22:23:41.623234 systemd-tmpfiles[1573]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 22:23:41.625111 systemd-tmpfiles[1573]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 22:23:41.638007 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 22:23:41.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:41.845557 systemd-fsck[1578]: fsck.fat 4.2 (2021-01-31) Feb 12 22:23:41.845557 systemd-fsck[1578]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters Feb 12 22:23:41.849904 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 22:23:41.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:41.853712 systemd[1]: Mounting boot.mount... Feb 12 22:23:41.867726 systemd[1]: Mounted boot.mount. Feb 12 22:23:41.921576 systemd[1]: Finished systemd-boot-update.service. Feb 12 22:23:41.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:42.030808 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 22:23:42.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:42.033996 systemd[1]: Starting audit-rules.service... Feb 12 22:23:42.036574 systemd[1]: Starting clean-ca-certificates.service... Feb 12 22:23:42.040181 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 22:23:42.045000 audit: BPF prog-id=27 op=LOAD Feb 12 22:23:42.046372 systemd[1]: Starting systemd-resolved.service... Feb 12 22:23:42.048000 audit: BPF prog-id=28 op=LOAD Feb 12 22:23:42.049754 systemd[1]: Starting systemd-timesyncd.service... Feb 12 22:23:42.054327 systemd[1]: Starting systemd-update-utmp.service... Feb 12 22:23:42.077004 systemd[1]: Finished clean-ca-certificates.service. Feb 12 22:23:42.078467 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 22:23:42.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:42.092000 audit[1598]: SYSTEM_BOOT pid=1598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 22:23:42.101266 systemd[1]: Finished systemd-update-utmp.service. Feb 12 22:23:42.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:42.147772 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 22:23:42.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:42.219137 systemd[1]: Started systemd-timesyncd.service. Feb 12 22:23:42.220841 systemd[1]: Reached target time-set.target. Feb 12 22:23:42.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:42.222118 systemd-resolved[1596]: Positive Trust Anchors: Feb 12 22:23:42.222134 systemd-resolved[1596]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:23:42.222183 systemd-resolved[1596]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:23:42.258486 augenrules[1613]: No rules Feb 12 22:23:42.258000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 22:23:42.258000 audit[1613]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca9f17fa0 a2=420 a3=0 items=0 ppid=1592 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:42.258000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 22:23:42.260646 systemd[1]: Finished audit-rules.service. Feb 12 22:23:42.298672 systemd-resolved[1596]: Defaulting to hostname 'linux'. Feb 12 22:23:42.300713 systemd[1]: Started systemd-resolved.service. Feb 12 22:23:42.302106 systemd[1]: Reached target network.target. Feb 12 22:23:42.303104 systemd[1]: Reached target nss-lookup.target. Feb 12 22:23:42.455588 systemd-timesyncd[1597]: Contacted time server 23.150.40.242:123 (0.flatcar.pool.ntp.org). Feb 12 22:23:42.455742 systemd-timesyncd[1597]: Initial clock synchronization to Mon 2024-02-12 22:23:42.782394 UTC. Feb 12 22:23:43.133235 systemd-networkd[1459]: eth0: Gained IPv6LL Feb 12 22:23:43.135404 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 22:23:43.137462 systemd[1]: Reached target network-online.target. Feb 12 22:23:43.216763 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 22:23:43.217480 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 22:23:43.830474 ldconfig[1569]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 22:23:43.901147 systemd[1]: Finished ldconfig.service. Feb 12 22:23:43.903736 systemd[1]: Starting systemd-update-done.service... Feb 12 22:23:43.915479 systemd[1]: Finished systemd-update-done.service. Feb 12 22:23:43.917627 systemd[1]: Reached target sysinit.target. Feb 12 22:23:43.919105 systemd[1]: Started motdgen.path. Feb 12 22:23:43.920483 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 22:23:43.922927 systemd[1]: Started logrotate.timer. Feb 12 22:23:43.924337 systemd[1]: Started mdadm.timer. Feb 12 22:23:43.926377 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 22:23:43.928640 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 22:23:43.928694 systemd[1]: Reached target paths.target. Feb 12 22:23:43.929669 systemd[1]: Reached target timers.target. Feb 12 22:23:43.932150 systemd[1]: Listening on dbus.socket. Feb 12 22:23:43.935497 systemd[1]: Starting docker.socket... Feb 12 22:23:43.939863 systemd[1]: Listening on sshd.socket. Feb 12 22:23:43.941168 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:23:43.941769 systemd[1]: Listening on docker.socket. Feb 12 22:23:43.942970 systemd[1]: Reached target sockets.target. Feb 12 22:23:43.944293 systemd[1]: Reached target basic.target. Feb 12 22:23:43.945772 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:23:43.945813 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:23:43.948335 systemd[1]: Started amazon-ssm-agent.service. Feb 12 22:23:43.952372 systemd[1]: Starting containerd.service... Feb 12 22:23:43.962659 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 22:23:43.968227 systemd[1]: Starting dbus.service... Feb 12 22:23:43.971813 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 22:23:43.975319 systemd[1]: Starting extend-filesystems.service... Feb 12 22:23:43.977243 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 22:23:43.985688 systemd[1]: Starting motdgen.service... Feb 12 22:23:43.990606 systemd[1]: Started nvidia.service. Feb 12 22:23:43.996011 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 22:23:44.004436 systemd[1]: Starting prepare-critools.service... Feb 12 22:23:44.007491 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 22:23:44.013283 systemd[1]: Starting sshd-keygen.service... Feb 12 22:23:44.017810 jq[1627]: false Feb 12 22:23:44.019736 systemd[1]: Starting systemd-logind.service... Feb 12 22:23:44.021185 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:23:44.021256 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 22:23:44.021891 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 22:23:44.055821 jq[1639]: true Feb 12 22:23:44.024422 systemd[1]: Starting update-engine.service... Feb 12 22:23:44.039308 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 22:23:44.056930 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 22:23:44.057230 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 22:23:44.078999 tar[1641]: crictl Feb 12 22:23:44.099639 jq[1642]: true Feb 12 22:23:44.105717 tar[1643]: ./ Feb 12 22:23:44.105717 tar[1643]: ./macvlan Feb 12 22:23:44.126806 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 22:23:44.127029 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 22:23:44.163285 extend-filesystems[1628]: Found nvme0n1 Feb 12 22:23:44.165145 extend-filesystems[1628]: Found nvme0n1p1 Feb 12 22:23:44.221274 extend-filesystems[1628]: Found nvme0n1p2 Feb 12 22:23:44.222561 extend-filesystems[1628]: Found nvme0n1p3 Feb 12 22:23:44.228447 extend-filesystems[1628]: Found usr Feb 12 22:23:44.231081 extend-filesystems[1628]: Found nvme0n1p4 Feb 12 22:23:44.231081 extend-filesystems[1628]: Found nvme0n1p6 Feb 12 22:23:44.231081 extend-filesystems[1628]: Found nvme0n1p7 Feb 12 22:23:44.231081 extend-filesystems[1628]: Found nvme0n1p9 Feb 12 22:23:44.231081 extend-filesystems[1628]: Checking size of /dev/nvme0n1p9 Feb 12 22:23:44.325148 dbus-daemon[1626]: [system] SELinux support is enabled Feb 12 22:23:44.325529 systemd[1]: Started dbus.service. Feb 12 22:23:44.330713 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 22:23:44.330751 systemd[1]: Reached target system-config.target. Feb 12 22:23:44.333432 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 22:23:44.333464 systemd[1]: Reached target user-config.target. Feb 12 22:23:44.338111 dbus-daemon[1626]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1459 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 12 22:23:44.345687 extend-filesystems[1628]: Resized partition /dev/nvme0n1p9 Feb 12 22:23:44.348424 dbus-daemon[1626]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 22:23:44.370140 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 22:23:44.370357 systemd[1]: Finished motdgen.service. Feb 12 22:23:44.375013 systemd[1]: Starting systemd-hostnamed.service... Feb 12 22:23:44.419078 extend-filesystems[1682]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 22:23:44.434092 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 12 22:23:44.516052 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 12 22:23:44.552198 extend-filesystems[1682]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 12 22:23:44.552198 extend-filesystems[1682]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 22:23:44.552198 extend-filesystems[1682]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 12 22:23:44.571555 extend-filesystems[1628]: Resized filesystem in /dev/nvme0n1p9 Feb 12 22:23:44.573687 bash[1686]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:23:44.556719 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 22:23:44.556946 systemd[1]: Finished extend-filesystems.service. Feb 12 22:23:44.567238 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 22:23:44.583716 systemd-logind[1637]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 22:23:44.583747 systemd-logind[1637]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 12 22:23:44.583773 systemd-logind[1637]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 22:23:44.586545 systemd-logind[1637]: New seat seat0. Feb 12 22:23:44.597257 amazon-ssm-agent[1623]: 2024/02/12 22:23:44 Failed to load instance info from vault. RegistrationKey does not exist. Feb 12 22:23:44.599708 systemd[1]: Started systemd-logind.service. Feb 12 22:23:44.608725 amazon-ssm-agent[1623]: Initializing new seelog logger Feb 12 22:23:44.616567 amazon-ssm-agent[1623]: New Seelog Logger Creation Complete Feb 12 22:23:44.617450 amazon-ssm-agent[1623]: 2024/02/12 22:23:44 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 22:23:44.626129 amazon-ssm-agent[1623]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 22:23:44.626858 amazon-ssm-agent[1623]: 2024/02/12 22:23:44 processing appconfig overrides Feb 12 22:23:44.662022 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 22:23:44.683696 dbus-daemon[1626]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 12 22:23:44.684127 systemd[1]: Started systemd-hostnamed.service. Feb 12 22:23:44.689144 dbus-daemon[1626]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1688 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 12 22:23:44.695431 systemd[1]: Starting polkit.service... Feb 12 22:23:44.697280 env[1647]: time="2024-02-12T22:23:44.694177951Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 22:23:44.727844 update_engine[1638]: I0212 22:23:44.726830 1638 main.cc:92] Flatcar Update Engine starting Feb 12 22:23:44.734613 tar[1643]: ./static Feb 12 22:23:44.746079 systemd[1]: Started update-engine.service. Feb 12 22:23:44.757664 systemd[1]: Started locksmithd.service. Feb 12 22:23:44.760578 update_engine[1638]: I0212 22:23:44.760532 1638 update_check_scheduler.cc:74] Next update check in 8m34s Feb 12 22:23:44.796210 polkitd[1713]: Started polkitd version 121 Feb 12 22:23:44.823135 polkitd[1713]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 22:23:44.823315 polkitd[1713]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 22:23:44.825589 polkitd[1713]: Finished loading, compiling and executing 2 rules Feb 12 22:23:44.826258 dbus-daemon[1626]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 22:23:44.826474 systemd[1]: Started polkit.service. Feb 12 22:23:44.829325 polkitd[1713]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 22:23:44.852116 systemd-hostnamed[1688]: Hostname set to (transient) Feb 12 22:23:44.852249 systemd-resolved[1596]: System hostname changed to 'ip-172-31-23-13'. Feb 12 22:23:44.921698 env[1647]: time="2024-02-12T22:23:44.921635380Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 22:23:44.921917 env[1647]: time="2024-02-12T22:23:44.921890162Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:23:44.923816 env[1647]: time="2024-02-12T22:23:44.923763578Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:23:44.923816 env[1647]: time="2024-02-12T22:23:44.923812880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:23:44.924172 env[1647]: time="2024-02-12T22:23:44.924118156Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:23:44.924246 env[1647]: time="2024-02-12T22:23:44.924174306Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 22:23:44.924246 env[1647]: time="2024-02-12T22:23:44.924194384Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 22:23:44.924246 env[1647]: time="2024-02-12T22:23:44.924209116Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 22:23:44.924361 env[1647]: time="2024-02-12T22:23:44.924315208Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:23:44.924633 env[1647]: time="2024-02-12T22:23:44.924609323Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:23:44.924868 env[1647]: time="2024-02-12T22:23:44.924837743Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:23:44.924928 env[1647]: time="2024-02-12T22:23:44.924869694Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 22:23:44.924971 env[1647]: time="2024-02-12T22:23:44.924939920Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 22:23:44.924971 env[1647]: time="2024-02-12T22:23:44.924957391Z" level=info msg="metadata content store policy set" policy=shared Feb 12 22:23:44.939448 env[1647]: time="2024-02-12T22:23:44.939345603Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 22:23:44.939448 env[1647]: time="2024-02-12T22:23:44.939404331Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 22:23:44.939448 env[1647]: time="2024-02-12T22:23:44.939425720Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 22:23:44.939671 env[1647]: time="2024-02-12T22:23:44.939493075Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 22:23:44.939671 env[1647]: time="2024-02-12T22:23:44.939514936Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 22:23:44.939671 env[1647]: time="2024-02-12T22:23:44.939580927Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 22:23:44.939671 env[1647]: time="2024-02-12T22:23:44.939602359Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 22:23:44.939671 env[1647]: time="2024-02-12T22:23:44.939626045Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 22:23:44.939671 env[1647]: time="2024-02-12T22:23:44.939657853Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 22:23:44.939893 env[1647]: time="2024-02-12T22:23:44.939677921Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 22:23:44.939893 env[1647]: time="2024-02-12T22:23:44.939698342Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 22:23:44.939893 env[1647]: time="2024-02-12T22:23:44.939720026Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 22:23:44.939893 env[1647]: time="2024-02-12T22:23:44.939872570Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 22:23:44.940068 env[1647]: time="2024-02-12T22:23:44.939979612Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 22:23:44.940552 env[1647]: time="2024-02-12T22:23:44.940520647Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 22:23:44.940643 env[1647]: time="2024-02-12T22:23:44.940567184Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.940643 env[1647]: time="2024-02-12T22:23:44.940587637Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 22:23:44.940736 env[1647]: time="2024-02-12T22:23:44.940686709Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.940792 env[1647]: time="2024-02-12T22:23:44.940771377Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.940835 env[1647]: time="2024-02-12T22:23:44.940799952Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.940835 env[1647]: time="2024-02-12T22:23:44.940819113Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.940921 env[1647]: time="2024-02-12T22:23:44.940839086Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.940921 env[1647]: time="2024-02-12T22:23:44.940858879Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.940921 env[1647]: time="2024-02-12T22:23:44.940880819Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.940921 env[1647]: time="2024-02-12T22:23:44.940899417Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.941163 env[1647]: time="2024-02-12T22:23:44.940922643Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 22:23:44.941163 env[1647]: time="2024-02-12T22:23:44.941116534Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.941163 env[1647]: time="2024-02-12T22:23:44.941142922Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.941285 env[1647]: time="2024-02-12T22:23:44.941163725Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.941285 env[1647]: time="2024-02-12T22:23:44.941182714Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 22:23:44.941285 env[1647]: time="2024-02-12T22:23:44.941206423Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 22:23:44.941285 env[1647]: time="2024-02-12T22:23:44.941223613Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 22:23:44.941285 env[1647]: time="2024-02-12T22:23:44.941249452Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 22:23:44.941467 env[1647]: time="2024-02-12T22:23:44.941295029Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 22:23:44.941721 env[1647]: time="2024-02-12T22:23:44.941587476Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 22:23:44.944646 env[1647]: time="2024-02-12T22:23:44.941732377Z" level=info msg="Connect containerd service" Feb 12 22:23:44.944646 env[1647]: time="2024-02-12T22:23:44.941780168Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 22:23:44.945952 env[1647]: time="2024-02-12T22:23:44.945910240Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:23:44.946095 tar[1643]: ./vlan Feb 12 22:23:44.946340 env[1647]: time="2024-02-12T22:23:44.946313159Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 22:23:44.946411 env[1647]: time="2024-02-12T22:23:44.946382620Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 22:23:44.946530 systemd[1]: Started containerd.service. Feb 12 22:23:44.948621 env[1647]: time="2024-02-12T22:23:44.948592493Z" level=info msg="containerd successfully booted in 0.282039s" Feb 12 22:23:44.952779 env[1647]: time="2024-02-12T22:23:44.952722444Z" level=info msg="Start subscribing containerd event" Feb 12 22:23:44.952879 env[1647]: time="2024-02-12T22:23:44.952813341Z" level=info msg="Start recovering state" Feb 12 22:23:44.952926 env[1647]: time="2024-02-12T22:23:44.952908350Z" level=info msg="Start event monitor" Feb 12 22:23:44.952984 env[1647]: time="2024-02-12T22:23:44.952933703Z" level=info msg="Start snapshots syncer" Feb 12 22:23:44.952984 env[1647]: time="2024-02-12T22:23:44.952950885Z" level=info msg="Start cni network conf syncer for default" Feb 12 22:23:44.953140 env[1647]: time="2024-02-12T22:23:44.952969124Z" level=info msg="Start streaming server" Feb 12 22:23:45.131932 tar[1643]: ./portmap Feb 12 22:23:45.301471 tar[1643]: ./host-local Feb 12 22:23:45.356044 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Create new startup processor Feb 12 22:23:45.356462 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [LongRunningPluginsManager] registered plugins: {} Feb 12 22:23:45.356767 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Initializing bookkeeping folders Feb 12 22:23:45.356872 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO removing the completed state files Feb 12 22:23:45.356961 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Initializing bookkeeping folders for long running plugins Feb 12 22:23:45.357082 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 12 22:23:45.357183 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Initializing healthcheck folders for long running plugins Feb 12 22:23:45.357262 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Initializing locations for inventory plugin Feb 12 22:23:45.357356 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Initializing default location for custom inventory Feb 12 22:23:45.357435 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Initializing default location for file inventory Feb 12 22:23:45.357510 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Initializing default location for role inventory Feb 12 22:23:45.357586 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Init the cloudwatchlogs publisher Feb 12 22:23:45.357669 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Successfully loaded platform independent plugin aws:softwareInventory Feb 12 22:23:45.357747 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 12 22:23:45.357824 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 12 22:23:45.357900 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Successfully loaded platform independent plugin aws:runDockerAction Feb 12 22:23:45.357976 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Successfully loaded platform independent plugin aws:runDocument Feb 12 22:23:45.358063 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Successfully loaded platform independent plugin aws:configureDocker Feb 12 22:23:45.358145 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Successfully loaded platform independent plugin aws:refreshAssociation Feb 12 22:23:45.358244 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Successfully loaded platform independent plugin aws:configurePackage Feb 12 22:23:45.358339 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Successfully loaded platform independent plugin aws:downloadContent Feb 12 22:23:45.358419 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Successfully loaded platform dependent plugin aws:runShellScript Feb 12 22:23:45.358499 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 12 22:23:45.358579 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO OS: linux, Arch: amd64 Feb 12 22:23:45.359541 amazon-ssm-agent[1623]: datastore file /var/lib/amazon/ssm/i-0c9b9432a461eed7a/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 12 22:23:45.360737 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessagingDeliveryService] Starting document processing engine... Feb 12 22:23:45.365446 coreos-metadata[1625]: Feb 12 22:23:45.365 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 12 22:23:45.368716 coreos-metadata[1625]: Feb 12 22:23:45.368 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 12 22:23:45.369422 coreos-metadata[1625]: Feb 12 22:23:45.369 INFO Fetch successful Feb 12 22:23:45.369422 coreos-metadata[1625]: Feb 12 22:23:45.369 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 12 22:23:45.370357 coreos-metadata[1625]: Feb 12 22:23:45.369 INFO Fetch successful Feb 12 22:23:45.373025 unknown[1625]: wrote ssh authorized keys file for user: core Feb 12 22:23:45.415935 update-ssh-keys[1803]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:23:45.417795 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 22:23:45.456891 tar[1643]: ./vrf Feb 12 22:23:45.459476 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 12 22:23:45.555566 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 12 22:23:45.576176 tar[1643]: ./bridge Feb 12 22:23:45.650076 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessagingDeliveryService] Starting message polling Feb 12 22:23:45.677357 tar[1643]: ./tuning Feb 12 22:23:45.721459 tar[1643]: ./firewall Feb 12 22:23:45.744767 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 12 22:23:45.804146 tar[1643]: ./host-device Feb 12 22:23:45.839720 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [instanceID=i-0c9b9432a461eed7a] Starting association polling Feb 12 22:23:45.874220 tar[1643]: ./sbr Feb 12 22:23:45.925162 tar[1643]: ./loopback Feb 12 22:23:45.934790 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 12 22:23:46.005966 tar[1643]: ./dhcp Feb 12 22:23:46.030118 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 12 22:23:46.125652 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 12 22:23:46.185668 tar[1643]: ./ptp Feb 12 22:23:46.203942 systemd[1]: Finished prepare-critools.service. Feb 12 22:23:46.221279 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 12 22:23:46.243774 tar[1643]: ./ipvlan Feb 12 22:23:46.296980 tar[1643]: ./bandwidth Feb 12 22:23:46.317177 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 12 22:23:46.369643 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 22:23:46.413401 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [OfflineService] Starting document processing engine... Feb 12 22:23:46.510640 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [OfflineService] [EngineProcessor] Starting Feb 12 22:23:46.607593 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [OfflineService] [EngineProcessor] Initial processing Feb 12 22:23:46.612489 locksmithd[1715]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 22:23:46.704450 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [OfflineService] Starting message polling Feb 12 22:23:46.801479 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [OfflineService] Starting send replies to MDS Feb 12 22:23:46.839605 sshd_keygen[1662]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 22:23:46.875406 systemd[1]: Finished sshd-keygen.service. Feb 12 22:23:46.880218 systemd[1]: Starting issuegen.service... Feb 12 22:23:46.896410 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 22:23:46.896578 systemd[1]: Finished issuegen.service. Feb 12 22:23:46.900078 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 12 22:23:46.908027 systemd[1]: Starting systemd-user-sessions.service... Feb 12 22:23:46.917943 systemd[1]: Finished systemd-user-sessions.service. Feb 12 22:23:46.921637 systemd[1]: Started getty@tty1.service. Feb 12 22:23:46.924144 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 22:23:46.925484 systemd[1]: Reached target getty.target. Feb 12 22:23:46.927099 systemd[1]: Reached target multi-user.target. Feb 12 22:23:46.930536 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 22:23:46.948446 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 22:23:46.948705 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 22:23:46.950383 systemd[1]: Startup finished in 727ms (kernel) + 9.596s (initrd) + 14.554s (userspace) = 24.878s. Feb 12 22:23:46.996979 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 12 22:23:47.094438 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [HealthCheck] HealthCheck reporting agent health. Feb 12 22:23:47.192814 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessageGatewayService] Starting session document processing engine... Feb 12 22:23:47.290965 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 12 22:23:47.389906 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 12 22:23:47.488230 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0c9b9432a461eed7a, requestId: 7a559e26-479c-46d7-8f57-d521961e7a4a Feb 12 22:23:47.586808 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessageGatewayService] listening reply. Feb 12 22:23:47.686410 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 12 22:23:47.785719 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [StartupProcessor] Executing startup processor tasks Feb 12 22:23:47.885953 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 12 22:23:47.985467 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 12 22:23:48.085205 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 12 22:23:48.186111 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0c9b9432a461eed7a?role=subscribe&stream=input Feb 12 22:23:48.286392 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0c9b9432a461eed7a?role=subscribe&stream=input Feb 12 22:23:48.386422 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessageGatewayService] Starting receiving message from control channel Feb 12 22:23:48.487647 amazon-ssm-agent[1623]: 2024-02-12 22:23:45 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 12 22:23:52.699367 systemd[1]: Created slice system-sshd.slice. Feb 12 22:23:52.701150 systemd[1]: Started sshd@0-172.31.23.13:22-139.178.89.65:36664.service. Feb 12 22:23:52.952544 sshd[1837]: Accepted publickey for core from 139.178.89.65 port 36664 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:23:52.954766 sshd[1837]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:23:52.967600 systemd[1]: Created slice user-500.slice. Feb 12 22:23:52.969625 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 22:23:52.975062 systemd-logind[1637]: New session 1 of user core. Feb 12 22:23:52.982542 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 22:23:52.985640 systemd[1]: Starting user@500.service... Feb 12 22:23:52.990335 (systemd)[1840]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:23:53.097339 systemd[1840]: Queued start job for default target default.target. Feb 12 22:23:53.098176 systemd[1840]: Reached target paths.target. Feb 12 22:23:53.098207 systemd[1840]: Reached target sockets.target. Feb 12 22:23:53.098225 systemd[1840]: Reached target timers.target. Feb 12 22:23:53.098242 systemd[1840]: Reached target basic.target. Feb 12 22:23:53.098318 systemd[1840]: Reached target default.target. Feb 12 22:23:53.098360 systemd[1840]: Startup finished in 100ms. Feb 12 22:23:53.099162 systemd[1]: Started user@500.service. Feb 12 22:23:53.100610 systemd[1]: Started session-1.scope. Feb 12 22:23:53.255272 systemd[1]: Started sshd@1-172.31.23.13:22-139.178.89.65:36680.service. Feb 12 22:23:53.410882 sshd[1849]: Accepted publickey for core from 139.178.89.65 port 36680 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:23:53.412886 sshd[1849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:23:53.419262 systemd[1]: Started session-2.scope. Feb 12 22:23:53.420736 systemd-logind[1637]: New session 2 of user core. Feb 12 22:23:53.550664 sshd[1849]: pam_unix(sshd:session): session closed for user core Feb 12 22:23:53.553780 systemd[1]: sshd@1-172.31.23.13:22-139.178.89.65:36680.service: Deactivated successfully. Feb 12 22:23:53.554722 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 22:23:53.555456 systemd-logind[1637]: Session 2 logged out. Waiting for processes to exit. Feb 12 22:23:53.556287 systemd-logind[1637]: Removed session 2. Feb 12 22:23:53.576641 systemd[1]: Started sshd@2-172.31.23.13:22-139.178.89.65:36684.service. Feb 12 22:23:53.739787 sshd[1855]: Accepted publickey for core from 139.178.89.65 port 36684 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:23:53.741203 sshd[1855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:23:53.745848 systemd-logind[1637]: New session 3 of user core. Feb 12 22:23:53.746548 systemd[1]: Started session-3.scope. Feb 12 22:23:53.870615 sshd[1855]: pam_unix(sshd:session): session closed for user core Feb 12 22:23:53.874377 systemd[1]: sshd@2-172.31.23.13:22-139.178.89.65:36684.service: Deactivated successfully. Feb 12 22:23:53.875250 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 22:23:53.875941 systemd-logind[1637]: Session 3 logged out. Waiting for processes to exit. Feb 12 22:23:53.876930 systemd-logind[1637]: Removed session 3. Feb 12 22:23:53.897276 systemd[1]: Started sshd@3-172.31.23.13:22-139.178.89.65:36692.service. Feb 12 22:23:54.061393 sshd[1861]: Accepted publickey for core from 139.178.89.65 port 36692 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:23:54.062927 sshd[1861]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:23:54.071473 systemd[1]: Started session-4.scope. Feb 12 22:23:54.072170 systemd-logind[1637]: New session 4 of user core. Feb 12 22:23:54.196801 sshd[1861]: pam_unix(sshd:session): session closed for user core Feb 12 22:23:54.200288 systemd[1]: sshd@3-172.31.23.13:22-139.178.89.65:36692.service: Deactivated successfully. Feb 12 22:23:54.201135 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 22:23:54.201870 systemd-logind[1637]: Session 4 logged out. Waiting for processes to exit. Feb 12 22:23:54.202736 systemd-logind[1637]: Removed session 4. Feb 12 22:23:54.222278 systemd[1]: Started sshd@4-172.31.23.13:22-139.178.89.65:36700.service. Feb 12 22:23:54.384262 sshd[1867]: Accepted publickey for core from 139.178.89.65 port 36700 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:23:54.385753 sshd[1867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:23:54.391637 systemd[1]: Started session-5.scope. Feb 12 22:23:54.392217 systemd-logind[1637]: New session 5 of user core. Feb 12 22:23:54.677810 sudo[1870]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 22:23:54.678160 sudo[1870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:23:54.688792 dbus-daemon[1626]: \xd0} \u0018\u0012V: received setenforce notice (enforcing=-1508351024) Feb 12 22:23:54.693612 sudo[1870]: pam_unix(sudo:session): session closed for user root Feb 12 22:23:54.718668 sshd[1867]: pam_unix(sshd:session): session closed for user core Feb 12 22:23:54.724351 systemd[1]: sshd@4-172.31.23.13:22-139.178.89.65:36700.service: Deactivated successfully. Feb 12 22:23:54.725405 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 22:23:54.726223 systemd-logind[1637]: Session 5 logged out. Waiting for processes to exit. Feb 12 22:23:54.727502 systemd-logind[1637]: Removed session 5. Feb 12 22:23:54.745023 systemd[1]: Started sshd@5-172.31.23.13:22-139.178.89.65:36704.service. Feb 12 22:23:54.924645 sshd[1874]: Accepted publickey for core from 139.178.89.65 port 36704 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:23:54.926349 sshd[1874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:23:54.933899 systemd-logind[1637]: New session 6 of user core. Feb 12 22:23:54.934519 systemd[1]: Started session-6.scope. Feb 12 22:23:55.047511 sudo[1878]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 22:23:55.047813 sudo[1878]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:23:55.051168 sudo[1878]: pam_unix(sudo:session): session closed for user root Feb 12 22:23:55.056757 sudo[1877]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 22:23:55.057210 sudo[1877]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:23:55.068554 systemd[1]: Stopping audit-rules.service... Feb 12 22:23:55.069000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:23:55.071667 kernel: kauditd_printk_skb: 185 callbacks suppressed Feb 12 22:23:55.071742 kernel: audit: type=1305 audit(1707776635.069:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:23:55.071773 auditctl[1881]: No rules Feb 12 22:23:55.072300 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 22:23:55.072603 systemd[1]: Stopped audit-rules.service. Feb 12 22:23:55.069000 audit[1881]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc264c8050 a2=420 a3=0 items=0 ppid=1 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:55.075829 systemd[1]: Starting audit-rules.service... Feb 12 22:23:55.069000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:23:55.086954 kernel: audit: type=1300 audit(1707776635.069:168): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc264c8050 a2=420 a3=0 items=0 ppid=1 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:55.087060 kernel: audit: type=1327 audit(1707776635.069:168): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:23:55.087105 kernel: audit: type=1131 audit(1707776635.071:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.106166 augenrules[1898]: No rules Feb 12 22:23:55.107182 systemd[1]: Finished audit-rules.service. Feb 12 22:23:55.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.108829 sudo[1877]: pam_unix(sudo:session): session closed for user root Feb 12 22:23:55.107000 audit[1877]: USER_END pid=1877 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.117983 kernel: audit: type=1130 audit(1707776635.106:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.118201 kernel: audit: type=1106 audit(1707776635.107:171): pid=1877 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.118241 kernel: audit: type=1104 audit(1707776635.107:172): pid=1877 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.107000 audit[1877]: CRED_DISP pid=1877 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.132356 sshd[1874]: pam_unix(sshd:session): session closed for user core Feb 12 22:23:55.133000 audit[1874]: USER_END pid=1874 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:55.137630 systemd[1]: sshd@5-172.31.23.13:22-139.178.89.65:36704.service: Deactivated successfully. Feb 12 22:23:55.139200 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 22:23:55.141069 systemd-logind[1637]: Session 6 logged out. Waiting for processes to exit. Feb 12 22:23:55.133000 audit[1874]: CRED_DISP pid=1874 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:55.142462 systemd-logind[1637]: Removed session 6. Feb 12 22:23:55.148591 kernel: audit: type=1106 audit(1707776635.133:173): pid=1874 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:55.148802 kernel: audit: type=1104 audit(1707776635.133:174): pid=1874 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:55.148837 kernel: audit: type=1131 audit(1707776635.136:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.23.13:22-139.178.89.65:36704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.23.13:22-139.178.89.65:36704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.160318 systemd[1]: Started sshd@6-172.31.23.13:22-139.178.89.65:36710.service. Feb 12 22:23:55.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.13:22-139.178.89.65:36710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.318000 audit[1904]: USER_ACCT pid=1904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:55.319344 sshd[1904]: Accepted publickey for core from 139.178.89.65 port 36710 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:23:55.320000 audit[1904]: CRED_ACQ pid=1904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:55.320000 audit[1904]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2c823090 a2=3 a3=0 items=0 ppid=1 pid=1904 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:55.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:23:55.322814 sshd[1904]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:23:55.329864 systemd[1]: Started session-7.scope. Feb 12 22:23:55.330511 systemd-logind[1637]: New session 7 of user core. Feb 12 22:23:55.336000 audit[1904]: USER_START pid=1904 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:55.338000 audit[1906]: CRED_ACQ pid=1906 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:55.430000 audit[1907]: USER_ACCT pid=1907 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.431980 sudo[1907]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 22:23:55.431000 audit[1907]: CRED_REFR pid=1907 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:55.432301 sudo[1907]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:23:55.433000 audit[1907]: USER_START pid=1907 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:56.043966 systemd[1]: Reloading. Feb 12 22:23:56.142850 /usr/lib/systemd/system-generators/torcx-generator[1940]: time="2024-02-12T22:23:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:23:56.143320 /usr/lib/systemd/system-generators/torcx-generator[1940]: time="2024-02-12T22:23:56Z" level=info msg="torcx already run" Feb 12 22:23:56.246279 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:23:56.246303 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:23:56.275895 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:23:56.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit: BPF prog-id=37 op=LOAD Feb 12 22:23:56.382000 audit: BPF prog-id=32 op=UNLOAD Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit: BPF prog-id=38 op=LOAD Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.382000 audit: BPF prog-id=39 op=LOAD Feb 12 22:23:56.382000 audit: BPF prog-id=33 op=UNLOAD Feb 12 22:23:56.382000 audit: BPF prog-id=34 op=UNLOAD Feb 12 22:23:56.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.384000 audit: BPF prog-id=40 op=LOAD Feb 12 22:23:56.385000 audit: BPF prog-id=29 op=UNLOAD Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit: BPF prog-id=41 op=LOAD Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.385000 audit: BPF prog-id=42 op=LOAD Feb 12 22:23:56.385000 audit: BPF prog-id=30 op=UNLOAD Feb 12 22:23:56.385000 audit: BPF prog-id=31 op=UNLOAD Feb 12 22:23:56.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.389000 audit: BPF prog-id=43 op=LOAD Feb 12 22:23:56.389000 audit: BPF prog-id=28 op=UNLOAD Feb 12 22:23:56.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit: BPF prog-id=44 op=LOAD Feb 12 22:23:56.391000 audit: BPF prog-id=24 op=UNLOAD Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit: BPF prog-id=45 op=LOAD Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.391000 audit: BPF prog-id=46 op=LOAD Feb 12 22:23:56.391000 audit: BPF prog-id=25 op=UNLOAD Feb 12 22:23:56.391000 audit: BPF prog-id=26 op=UNLOAD Feb 12 22:23:56.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.393000 audit: BPF prog-id=47 op=LOAD Feb 12 22:23:56.393000 audit: BPF prog-id=23 op=UNLOAD Feb 12 22:23:56.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.394000 audit: BPF prog-id=48 op=LOAD Feb 12 22:23:56.394000 audit: BPF prog-id=35 op=UNLOAD Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit: BPF prog-id=49 op=LOAD Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.395000 audit: BPF prog-id=50 op=LOAD Feb 12 22:23:56.395000 audit: BPF prog-id=21 op=UNLOAD Feb 12 22:23:56.395000 audit: BPF prog-id=22 op=UNLOAD Feb 12 22:23:56.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.396000 audit: BPF prog-id=51 op=LOAD Feb 12 22:23:56.396000 audit: BPF prog-id=18 op=UNLOAD Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit: BPF prog-id=52 op=LOAD Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.397000 audit: BPF prog-id=53 op=LOAD Feb 12 22:23:56.397000 audit: BPF prog-id=19 op=UNLOAD Feb 12 22:23:56.397000 audit: BPF prog-id=20 op=UNLOAD Feb 12 22:23:56.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:56.400000 audit: BPF prog-id=54 op=LOAD Feb 12 22:23:56.400000 audit: BPF prog-id=27 op=UNLOAD Feb 12 22:23:56.421144 systemd[1]: Started kubelet.service. Feb 12 22:23:56.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:56.458829 systemd[1]: Starting coreos-metadata.service... Feb 12 22:23:56.560525 kubelet[1989]: E0212 22:23:56.560451 1989 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:23:56.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:23:56.564669 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:23:56.564798 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:23:56.609182 coreos-metadata[1996]: Feb 12 22:23:56.609 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 12 22:23:56.610123 coreos-metadata[1996]: Feb 12 22:23:56.610 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Feb 12 22:23:56.610966 coreos-metadata[1996]: Feb 12 22:23:56.610 INFO Fetch successful Feb 12 22:23:56.611098 coreos-metadata[1996]: Feb 12 22:23:56.610 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Feb 12 22:23:56.611755 coreos-metadata[1996]: Feb 12 22:23:56.611 INFO Fetch successful Feb 12 22:23:56.611755 coreos-metadata[1996]: Feb 12 22:23:56.611 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Feb 12 22:23:56.612631 coreos-metadata[1996]: Feb 12 22:23:56.612 INFO Fetch successful Feb 12 22:23:56.612733 coreos-metadata[1996]: Feb 12 22:23:56.612 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Feb 12 22:23:56.613501 coreos-metadata[1996]: Feb 12 22:23:56.613 INFO Fetch successful Feb 12 22:23:56.613501 coreos-metadata[1996]: Feb 12 22:23:56.613 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Feb 12 22:23:56.614352 coreos-metadata[1996]: Feb 12 22:23:56.614 INFO Fetch successful Feb 12 22:23:56.614413 coreos-metadata[1996]: Feb 12 22:23:56.614 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Feb 12 22:23:56.615279 coreos-metadata[1996]: Feb 12 22:23:56.615 INFO Fetch successful Feb 12 22:23:56.615350 coreos-metadata[1996]: Feb 12 22:23:56.615 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Feb 12 22:23:56.616264 coreos-metadata[1996]: Feb 12 22:23:56.616 INFO Fetch successful Feb 12 22:23:56.616363 coreos-metadata[1996]: Feb 12 22:23:56.616 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Feb 12 22:23:56.617049 coreos-metadata[1996]: Feb 12 22:23:56.617 INFO Fetch successful Feb 12 22:23:56.627245 systemd[1]: Finished coreos-metadata.service. Feb 12 22:23:56.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:57.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:57.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:57.775942 systemd[1]: Stopped kubelet.service. Feb 12 22:23:57.807277 systemd[1]: Reloading. Feb 12 22:23:57.911772 /usr/lib/systemd/system-generators/torcx-generator[2056]: time="2024-02-12T22:23:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:23:57.911810 /usr/lib/systemd/system-generators/torcx-generator[2056]: time="2024-02-12T22:23:57Z" level=info msg="torcx already run" Feb 12 22:23:58.011600 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:23:58.011757 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:23:58.039515 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit: BPF prog-id=55 op=LOAD Feb 12 22:23:58.124000 audit: BPF prog-id=37 op=UNLOAD Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit: BPF prog-id=56 op=LOAD Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.124000 audit: BPF prog-id=57 op=LOAD Feb 12 22:23:58.124000 audit: BPF prog-id=38 op=UNLOAD Feb 12 22:23:58.124000 audit: BPF prog-id=39 op=UNLOAD Feb 12 22:23:58.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit: BPF prog-id=58 op=LOAD Feb 12 22:23:58.127000 audit: BPF prog-id=40 op=UNLOAD Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit: BPF prog-id=59 op=LOAD Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.127000 audit: BPF prog-id=60 op=LOAD Feb 12 22:23:58.127000 audit: BPF prog-id=41 op=UNLOAD Feb 12 22:23:58.127000 audit: BPF prog-id=42 op=UNLOAD Feb 12 22:23:58.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.130000 audit: BPF prog-id=61 op=LOAD Feb 12 22:23:58.130000 audit: BPF prog-id=43 op=UNLOAD Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit: BPF prog-id=62 op=LOAD Feb 12 22:23:58.132000 audit: BPF prog-id=44 op=UNLOAD Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit: BPF prog-id=63 op=LOAD Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.132000 audit: BPF prog-id=64 op=LOAD Feb 12 22:23:58.132000 audit: BPF prog-id=45 op=UNLOAD Feb 12 22:23:58.132000 audit: BPF prog-id=46 op=UNLOAD Feb 12 22:23:58.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.134000 audit: BPF prog-id=65 op=LOAD Feb 12 22:23:58.134000 audit: BPF prog-id=47 op=UNLOAD Feb 12 22:23:58.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.135000 audit: BPF prog-id=66 op=LOAD Feb 12 22:23:58.135000 audit: BPF prog-id=48 op=UNLOAD Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit: BPF prog-id=67 op=LOAD Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.136000 audit: BPF prog-id=68 op=LOAD Feb 12 22:23:58.136000 audit: BPF prog-id=49 op=UNLOAD Feb 12 22:23:58.136000 audit: BPF prog-id=50 op=UNLOAD Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit: BPF prog-id=69 op=LOAD Feb 12 22:23:58.137000 audit: BPF prog-id=51 op=UNLOAD Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit: BPF prog-id=70 op=LOAD Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.137000 audit: BPF prog-id=71 op=LOAD Feb 12 22:23:58.137000 audit: BPF prog-id=52 op=UNLOAD Feb 12 22:23:58.137000 audit: BPF prog-id=53 op=UNLOAD Feb 12 22:23:58.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.141000 audit: BPF prog-id=72 op=LOAD Feb 12 22:23:58.141000 audit: BPF prog-id=54 op=UNLOAD Feb 12 22:23:58.164372 systemd[1]: Started kubelet.service. Feb 12 22:23:58.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:58.226787 kubelet[2108]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:23:58.226787 kubelet[2108]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:23:58.227282 kubelet[2108]: I0212 22:23:58.226868 2108 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:23:58.230189 kubelet[2108]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:23:58.230189 kubelet[2108]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:23:58.683906 kubelet[2108]: I0212 22:23:58.683871 2108 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 22:23:58.683906 kubelet[2108]: I0212 22:23:58.683901 2108 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:23:58.684326 kubelet[2108]: I0212 22:23:58.684296 2108 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 22:23:58.690403 kubelet[2108]: I0212 22:23:58.690206 2108 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:23:58.691244 kubelet[2108]: I0212 22:23:58.690856 2108 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:23:58.691552 kubelet[2108]: I0212 22:23:58.691521 2108 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 22:23:58.691552 kubelet[2108]: I0212 22:23:58.691552 2108 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 22:23:58.692198 kubelet[2108]: I0212 22:23:58.691569 2108 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 22:23:58.692198 kubelet[2108]: I0212 22:23:58.692085 2108 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:23:58.693325 kubelet[2108]: I0212 22:23:58.693306 2108 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:23:58.697490 kubelet[2108]: I0212 22:23:58.697468 2108 kubelet.go:398] "Attempting to sync node with API server" Feb 12 22:23:58.697490 kubelet[2108]: I0212 22:23:58.697492 2108 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:23:58.697620 kubelet[2108]: I0212 22:23:58.697517 2108 kubelet.go:297] "Adding apiserver pod source" Feb 12 22:23:58.697620 kubelet[2108]: I0212 22:23:58.697534 2108 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:23:58.698095 kubelet[2108]: E0212 22:23:58.698079 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:23:58.698576 kubelet[2108]: E0212 22:23:58.698562 2108 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:23:58.698778 kubelet[2108]: I0212 22:23:58.698763 2108 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:23:58.699186 kubelet[2108]: W0212 22:23:58.699167 2108 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 22:23:58.699710 kubelet[2108]: I0212 22:23:58.699691 2108 server.go:1186] "Started kubelet" Feb 12 22:23:58.700054 kubelet[2108]: I0212 22:23:58.700041 2108 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:23:58.702756 kubelet[2108]: I0212 22:23:58.702741 2108 server.go:451] "Adding debug handlers to kubelet server" Feb 12 22:23:58.704184 kubelet[2108]: E0212 22:23:58.704156 2108 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:23:58.704258 kubelet[2108]: E0212 22:23:58.704197 2108 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:23:58.706000 audit[2108]: AVC avc: denied { mac_admin } for pid=2108 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.706000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:23:58.706000 audit[2108]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ea07b0 a1=c000a71938 a2=c000ea0780 a3=25 items=0 ppid=1 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.706000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:23:58.706000 audit[2108]: AVC avc: denied { mac_admin } for pid=2108 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.706000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:23:58.706000 audit[2108]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bc2f40 a1=c000a71950 a2=c000ea0840 a3=25 items=0 ppid=1 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.706000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:23:58.708148 kubelet[2108]: I0212 22:23:58.707421 2108 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:23:58.708148 kubelet[2108]: I0212 22:23:58.707473 2108 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:23:58.708148 kubelet[2108]: I0212 22:23:58.707546 2108 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:23:58.716671 kubelet[2108]: I0212 22:23:58.716498 2108 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 22:23:58.717553 kubelet[2108]: I0212 22:23:58.717529 2108 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:23:58.752298 kubelet[2108]: E0212 22:23:58.752263 2108 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "172.31.23.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 22:23:58.752451 kubelet[2108]: W0212 22:23:58.752368 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:23:58.752451 kubelet[2108]: E0212 22:23:58.752391 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:23:58.752561 kubelet[2108]: E0212 22:23:58.752429 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0167774b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 699665227, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 699665227, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:58.752887 kubelet[2108]: W0212 22:23:58.752867 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.23.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 22:23:58.752967 kubelet[2108]: E0212 22:23:58.752901 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.23.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 22:23:58.752967 kubelet[2108]: W0212 22:23:58.752935 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 22:23:58.752967 kubelet[2108]: E0212 22:23:58.752949 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 22:23:58.761117 kubelet[2108]: I0212 22:23:58.761080 2108 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:23:58.761117 kubelet[2108]: I0212 22:23:58.761106 2108 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:23:58.761117 kubelet[2108]: I0212 22:23:58.761126 2108 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:23:58.767691 kubelet[2108]: E0212 22:23:58.767591 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce01ac69d5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 704183765, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 704183765, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:58.769404 kubelet[2108]: E0212 22:23:58.769332 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504c64a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.23.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760306250, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760306250, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:58.770393 kubelet[2108]: E0212 22:23:58.770280 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504d71c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.23.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760310556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760310556, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:58.774864 kubelet[2108]: E0212 22:23:58.772715 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504e761", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.23.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760314721, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760314721, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:58.775510 kubelet[2108]: I0212 22:23:58.775487 2108 policy_none.go:49] "None policy: Start" Feb 12 22:23:58.776476 kubelet[2108]: I0212 22:23:58.776456 2108 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:23:58.776566 kubelet[2108]: I0212 22:23:58.776484 2108 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:23:58.785370 systemd[1]: Created slice kubepods.slice. Feb 12 22:23:58.792925 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 22:23:58.803667 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 22:23:58.811568 kubelet[2108]: I0212 22:23:58.811543 2108 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:23:58.810000 audit[2108]: AVC avc: denied { mac_admin } for pid=2108 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.810000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:23:58.810000 audit[2108]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ff6360 a1=c000fc7908 a2=c000ff6330 a3=25 items=0 ppid=1 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.810000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:23:58.814141 kubelet[2108]: I0212 22:23:58.814124 2108 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:23:58.816652 kubelet[2108]: I0212 22:23:58.816632 2108 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:23:58.823618 kubelet[2108]: E0212 22:23:58.823595 2108 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.23.13\" not found" Feb 12 22:23:58.825934 kubelet[2108]: I0212 22:23:58.825910 2108 kubelet_node_status.go:70] "Attempting to register node" node="172.31.23.13" Feb 12 22:23:58.833000 audit[2122]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:58.833000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc99401d80 a2=0 a3=7ffc99401d6c items=0 ppid=2108 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.833000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:23:58.836000 audit[2126]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:58.836000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffde4e78420 a2=0 a3=7ffde4e7840c items=0 ppid=2108 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:23:58.839546 kubelet[2108]: E0212 22:23:58.839357 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce08d88cdf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 824516831, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 824516831, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:58.839908 kubelet[2108]: E0212 22:23:58.839890 2108 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.23.13" Feb 12 22:23:58.848656 kubelet[2108]: E0212 22:23:58.848488 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504c64a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.23.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760306250, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 825863289, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504c64a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:58.856197 kubelet[2108]: E0212 22:23:58.856092 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504d71c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.23.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760310556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 825869902, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504d71c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:58.859142 kubelet[2108]: E0212 22:23:58.859045 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504e761", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.23.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760314721, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 825873869, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504e761" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:58.842000 audit[2128]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:58.842000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcdf233dc0 a2=0 a3=7ffcdf233dac items=0 ppid=2108 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:23:58.902000 audit[2133]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:58.902000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe42eaf540 a2=0 a3=7ffe42eaf52c items=0 ppid=2108 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:23:58.959348 kubelet[2108]: E0212 22:23:58.959222 2108 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "172.31.23.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 22:23:59.000000 audit[2138]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.000000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffffc549570 a2=0 a3=7ffffc54955c items=0 ppid=2108 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 22:23:59.002000 audit[2139]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.002000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffb69c7280 a2=0 a3=7fffb69c726c items=0 ppid=2108 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 22:23:59.011000 audit[2142]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.011000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffbd4aa060 a2=0 a3=7fffbd4aa04c items=0 ppid=2108 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 22:23:59.016000 audit[2145]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.016000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffcad990ca0 a2=0 a3=7ffcad990c8c items=0 ppid=2108 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 22:23:59.018000 audit[2146]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.018000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe84524dd0 a2=0 a3=7ffe84524dbc items=0 ppid=2108 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 22:23:59.019000 audit[2147]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.019000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaea712f0 a2=0 a3=7ffcaea712dc items=0 ppid=2108 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:23:59.022000 audit[2149]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.022000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe02a3bae0 a2=0 a3=7ffe02a3bacc items=0 ppid=2108 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 22:23:59.042351 kubelet[2108]: I0212 22:23:59.042326 2108 kubelet_node_status.go:70] "Attempting to register node" node="172.31.23.13" Feb 12 22:23:59.046620 kubelet[2108]: E0212 22:23:59.046520 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504c64a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.23.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760306250, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 59, 42277513, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504c64a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:59.047273 kubelet[2108]: E0212 22:23:59.046926 2108 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.23.13" Feb 12 22:23:59.056265 kubelet[2108]: E0212 22:23:59.056158 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504d71c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.23.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760310556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 59, 42284660, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504d71c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:59.027000 audit[2151]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.027000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd723f5a30 a2=0 a3=7ffd723f5a1c items=0 ppid=2108 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:23:59.069000 audit[2154]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.069000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe44324690 a2=0 a3=7ffe4432467c items=0 ppid=2108 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 22:23:59.074000 audit[2156]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.074000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffec827a920 a2=0 a3=7ffec827a90c items=0 ppid=2108 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 22:23:59.083000 audit[2159]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.083000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffde457af70 a2=0 a3=7ffde457af5c items=0 ppid=2108 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 22:23:59.086777 kubelet[2108]: I0212 22:23:59.086750 2108 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 22:23:59.087000 audit[2160]: NETFILTER_CFG table=mangle:17 family=10 entries=2 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.087000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff42131130 a2=0 a3=7fff4213111c items=0 ppid=2108 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:23:59.087000 audit[2161]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.087000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5cb3fe90 a2=0 a3=7ffc5cb3fe7c items=0 ppid=2108 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:23:59.088000 audit[2162]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.088000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff62b059e0 a2=0 a3=7fff62b059cc items=0 ppid=2108 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 22:23:59.089000 audit[2163]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.089000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2532b960 a2=0 a3=7ffe2532b94c items=0 ppid=2108 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:23:59.094000 audit[2165]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:59.094000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9c219160 a2=0 a3=7ffe9c21914c items=0 ppid=2108 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:23:59.094000 audit[2166]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.094000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffea3c7cc10 a2=0 a3=7ffea3c7cbfc items=0 ppid=2108 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 22:23:59.096000 audit[2167]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.096000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd46f02f40 a2=0 a3=7ffd46f02f2c items=0 ppid=2108 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:23:59.099000 audit[2169]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.099000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc402213d0 a2=0 a3=7ffc402213bc items=0 ppid=2108 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 22:23:59.101000 audit[2170]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.101000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd7d859fd0 a2=0 a3=7ffd7d859fbc items=0 ppid=2108 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 22:23:59.102000 audit[2171]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.102000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc349bb40 a2=0 a3=7ffcc349bb2c items=0 ppid=2108 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:23:59.104552 kubelet[2108]: E0212 22:23:59.104449 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504e761", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.23.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760314721, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 59, 42289032, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504e761" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:59.104000 audit[2173]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=2173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.104000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc52f39610 a2=0 a3=7ffc52f395fc items=0 ppid=2108 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 22:23:59.107000 audit[2175]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.107000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc27978320 a2=0 a3=7ffc2797830c items=0 ppid=2108 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.107000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:23:59.110000 audit[2177]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.110000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe8d6893d0 a2=0 a3=7ffe8d6893bc items=0 ppid=2108 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 22:23:59.114000 audit[2179]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=2179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.114000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe76156ba0 a2=0 a3=7ffe76156b8c items=0 ppid=2108 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 22:23:59.120000 audit[2181]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.120000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7fffcd506580 a2=0 a3=7fffcd50656c items=0 ppid=2108 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 22:23:59.121908 kubelet[2108]: I0212 22:23:59.121885 2108 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 22:23:59.121908 kubelet[2108]: I0212 22:23:59.121909 2108 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 22:23:59.122431 kubelet[2108]: I0212 22:23:59.121932 2108 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 22:23:59.122431 kubelet[2108]: E0212 22:23:59.122342 2108 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 22:23:59.123000 audit[2182]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.123000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9ea986f0 a2=0 a3=7ffe9ea986dc items=0 ppid=2108 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:23:59.125091 kubelet[2108]: W0212 22:23:59.125070 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 22:23:59.125174 kubelet[2108]: E0212 22:23:59.125103 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 22:23:59.124000 audit[2183]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.124000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe525ff040 a2=0 a3=7ffe525ff02c items=0 ppid=2108 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:23:59.126000 audit[2184]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:59.126000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff456b9000 a2=0 a3=7fff456b8fec items=0 ppid=2108 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:23:59.362568 kubelet[2108]: E0212 22:23:59.362532 2108 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "172.31.23.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 22:23:59.450851 kubelet[2108]: I0212 22:23:59.450824 2108 kubelet_node_status.go:70] "Attempting to register node" node="172.31.23.13" Feb 12 22:23:59.463130 kubelet[2108]: E0212 22:23:59.463094 2108 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.23.13" Feb 12 22:23:59.463290 kubelet[2108]: E0212 22:23:59.463084 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504c64a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.23.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760306250, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 59, 450778711, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504c64a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:59.502209 kubelet[2108]: E0212 22:23:59.502099 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504d71c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.23.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760310556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 59, 450786027, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504d71c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:59.674687 kubelet[2108]: W0212 22:23:59.674157 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 22:23:59.674687 kubelet[2108]: E0212 22:23:59.674575 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 22:23:59.698917 kubelet[2108]: E0212 22:23:59.698869 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:23:59.701074 kubelet[2108]: E0212 22:23:59.700972 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504e761", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.23.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760314721, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 23, 59, 450790444, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504e761" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:23:59.864365 kubelet[2108]: W0212 22:23:59.864326 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:23:59.864365 kubelet[2108]: E0212 22:23:59.864364 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:24:00.131566 kubelet[2108]: W0212 22:24:00.131531 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.23.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 22:24:00.131566 kubelet[2108]: E0212 22:24:00.131569 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.23.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 22:24:00.190886 kubelet[2108]: E0212 22:24:00.190849 2108 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "172.31.23.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 22:24:00.246520 kubelet[2108]: W0212 22:24:00.246477 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 22:24:00.246520 kubelet[2108]: E0212 22:24:00.246527 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 22:24:00.264195 kubelet[2108]: I0212 22:24:00.264167 2108 kubelet_node_status.go:70] "Attempting to register node" node="172.31.23.13" Feb 12 22:24:00.266788 kubelet[2108]: E0212 22:24:00.266753 2108 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.23.13" Feb 12 22:24:00.266942 kubelet[2108]: E0212 22:24:00.266745 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504c64a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.23.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760306250, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 24, 0, 264068788, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504c64a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:24:00.268312 kubelet[2108]: E0212 22:24:00.268236 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504d71c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.23.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760310556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 24, 0, 264103016, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504d71c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:24:00.302230 kubelet[2108]: E0212 22:24:00.302141 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504e761", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.23.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760314721, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 24, 0, 264107268, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504e761" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:24:00.699870 kubelet[2108]: E0212 22:24:00.699809 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:01.700200 kubelet[2108]: E0212 22:24:01.700142 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:01.788101 kubelet[2108]: W0212 22:24:01.788061 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 22:24:01.788101 kubelet[2108]: E0212 22:24:01.788101 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 22:24:01.792494 kubelet[2108]: E0212 22:24:01.792445 2108 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "172.31.23.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 22:24:01.816373 kubelet[2108]: W0212 22:24:01.816339 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.23.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 22:24:01.816373 kubelet[2108]: E0212 22:24:01.816378 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.23.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 22:24:01.867728 kubelet[2108]: I0212 22:24:01.867700 2108 kubelet_node_status.go:70] "Attempting to register node" node="172.31.23.13" Feb 12 22:24:01.869401 kubelet[2108]: E0212 22:24:01.869371 2108 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.23.13" Feb 12 22:24:01.870132 kubelet[2108]: E0212 22:24:01.870017 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504c64a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.23.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760306250, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 24, 1, 867650688, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504c64a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:24:01.871339 kubelet[2108]: E0212 22:24:01.871249 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504d71c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.23.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760310556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 24, 1, 867663778, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504d71c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:24:01.872781 kubelet[2108]: E0212 22:24:01.872699 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504e761", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.23.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760314721, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 24, 1, 867668072, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504e761" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:24:02.562404 kubelet[2108]: W0212 22:24:02.562361 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:24:02.562555 kubelet[2108]: E0212 22:24:02.562419 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:24:02.700393 kubelet[2108]: E0212 22:24:02.700335 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:03.037052 kubelet[2108]: W0212 22:24:03.036934 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 22:24:03.037052 kubelet[2108]: E0212 22:24:03.036973 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 22:24:03.701134 kubelet[2108]: E0212 22:24:03.701081 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:04.701947 kubelet[2108]: E0212 22:24:04.701894 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:04.995934 kubelet[2108]: E0212 22:24:04.995825 2108 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "172.31.23.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 22:24:05.070420 kubelet[2108]: I0212 22:24:05.070162 2108 kubelet_node_status.go:70] "Attempting to register node" node="172.31.23.13" Feb 12 22:24:05.072716 kubelet[2108]: E0212 22:24:05.072680 2108 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.23.13" Feb 12 22:24:05.073206 kubelet[2108]: E0212 22:24:05.073061 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504c64a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.23.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760306250, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 24, 5, 70113500, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504c64a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:24:05.076579 kubelet[2108]: E0212 22:24:05.076498 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504d71c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.23.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760310556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 24, 5, 70120918, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504d71c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:24:05.077927 kubelet[2108]: E0212 22:24:05.077852 2108 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13.17b33dce0504e761", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.23.13", UID:"172.31.23.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.23.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.23.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 23, 58, 760314721, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 24, 5, 70125414, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.23.13.17b33dce0504e761" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 22:24:05.702401 kubelet[2108]: E0212 22:24:05.702351 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:06.231515 kubelet[2108]: W0212 22:24:06.231475 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.23.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 22:24:06.231515 kubelet[2108]: E0212 22:24:06.231513 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.23.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 22:24:06.339557 kubelet[2108]: W0212 22:24:06.339391 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 22:24:06.339557 kubelet[2108]: E0212 22:24:06.339563 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 22:24:06.702885 kubelet[2108]: E0212 22:24:06.702833 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:06.970507 kubelet[2108]: W0212 22:24:06.970397 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 22:24:06.970507 kubelet[2108]: E0212 22:24:06.970436 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 22:24:07.526919 kubelet[2108]: W0212 22:24:07.526879 2108 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:24:07.526919 kubelet[2108]: E0212 22:24:07.526920 2108 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 22:24:07.703970 kubelet[2108]: E0212 22:24:07.703901 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:08.692509 kubelet[2108]: I0212 22:24:08.692458 2108 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 22:24:08.704913 kubelet[2108]: E0212 22:24:08.704874 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:08.824092 kubelet[2108]: E0212 22:24:08.824061 2108 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.23.13\" not found" Feb 12 22:24:09.103803 kubelet[2108]: E0212 22:24:09.103765 2108 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.23.13" not found Feb 12 22:24:09.705856 kubelet[2108]: E0212 22:24:09.705815 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:10.157464 kubelet[2108]: E0212 22:24:10.157387 2108 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.23.13" not found Feb 12 22:24:10.706883 kubelet[2108]: E0212 22:24:10.706843 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:11.401390 kubelet[2108]: E0212 22:24:11.401349 2108 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.23.13\" not found" node="172.31.23.13" Feb 12 22:24:11.474423 kubelet[2108]: I0212 22:24:11.474392 2108 kubelet_node_status.go:70] "Attempting to register node" node="172.31.23.13" Feb 12 22:24:11.560524 kubelet[2108]: I0212 22:24:11.560483 2108 kubelet_node_status.go:73] "Successfully registered node" node="172.31.23.13" Feb 12 22:24:11.571761 kubelet[2108]: E0212 22:24:11.571698 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:11.673162 kubelet[2108]: E0212 22:24:11.673056 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:11.707735 kubelet[2108]: E0212 22:24:11.707687 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:11.730150 sudo[1907]: pam_unix(sudo:session): session closed for user root Feb 12 22:24:11.729000 audit[1907]: USER_END pid=1907 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:24:11.731440 kernel: kauditd_printk_skb: 540 callbacks suppressed Feb 12 22:24:11.731507 kernel: audit: type=1106 audit(1707776651.729:639): pid=1907 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:24:11.736000 audit[1907]: CRED_DISP pid=1907 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:24:11.743055 kernel: audit: type=1104 audit(1707776651.736:640): pid=1907 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:24:11.761099 sshd[1904]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:11.761000 audit[1904]: USER_END pid=1904 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:11.764678 systemd[1]: sshd@6-172.31.23.13:22-139.178.89.65:36710.service: Deactivated successfully. Feb 12 22:24:11.765706 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 22:24:11.768241 systemd-logind[1637]: Session 7 logged out. Waiting for processes to exit. Feb 12 22:24:11.761000 audit[1904]: CRED_DISP pid=1904 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:11.769725 systemd-logind[1637]: Removed session 7. Feb 12 22:24:11.773742 kubelet[2108]: E0212 22:24:11.773709 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:11.774845 kernel: audit: type=1106 audit(1707776651.761:641): pid=1904 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:11.774904 kernel: audit: type=1104 audit(1707776651.761:642): pid=1904 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:11.774937 kernel: audit: type=1131 audit(1707776651.764:643): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.13:22-139.178.89.65:36710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:11.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.13:22-139.178.89.65:36710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:11.875179 kubelet[2108]: E0212 22:24:11.875039 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:11.975794 kubelet[2108]: E0212 22:24:11.975669 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:12.076373 kubelet[2108]: E0212 22:24:12.076321 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:12.177134 kubelet[2108]: E0212 22:24:12.177081 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:12.278085 kubelet[2108]: E0212 22:24:12.277969 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:12.378715 kubelet[2108]: E0212 22:24:12.378671 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:12.479362 kubelet[2108]: E0212 22:24:12.479317 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:12.579509 kubelet[2108]: E0212 22:24:12.579452 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:12.680283 kubelet[2108]: E0212 22:24:12.680229 2108 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.23.13\" not found" Feb 12 22:24:12.708039 kubelet[2108]: E0212 22:24:12.707995 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:12.781121 kubelet[2108]: I0212 22:24:12.781091 2108 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 22:24:12.781433 env[1647]: time="2024-02-12T22:24:12.781392467Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 22:24:12.782013 kubelet[2108]: I0212 22:24:12.781868 2108 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 22:24:13.708223 kubelet[2108]: I0212 22:24:13.708190 2108 apiserver.go:52] "Watching apiserver" Feb 12 22:24:13.708633 kubelet[2108]: E0212 22:24:13.708199 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:13.711176 kubelet[2108]: I0212 22:24:13.711144 2108 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:24:13.711316 kubelet[2108]: I0212 22:24:13.711235 2108 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:24:13.711316 kubelet[2108]: I0212 22:24:13.711305 2108 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:24:13.711543 kubelet[2108]: E0212 22:24:13.711527 2108 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:13.717485 systemd[1]: Created slice kubepods-besteffort-pod4bdc8427_40c2_483c_b3fe_8f7529ac44f3.slice. Feb 12 22:24:13.719533 kubelet[2108]: I0212 22:24:13.719513 2108 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:24:13.728961 systemd[1]: Created slice kubepods-besteffort-pod95fde9ca_69fc_453f_bba3_435f919b520f.slice. Feb 12 22:24:13.810780 kubelet[2108]: I0212 22:24:13.810736 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4bdc8427-40c2-483c-b3fe-8f7529ac44f3-lib-modules\") pod \"kube-proxy-sx9lg\" (UID: \"4bdc8427-40c2-483c-b3fe-8f7529ac44f3\") " pod="kube-system/kube-proxy-sx9lg" Feb 12 22:24:13.810780 kubelet[2108]: I0212 22:24:13.810790 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e94dc6ea-cdbf-422e-a5e4-f121be40444c-kubelet-dir\") pod \"csi-node-driver-ghldj\" (UID: \"e94dc6ea-cdbf-422e-a5e4-f121be40444c\") " pod="calico-system/csi-node-driver-ghldj" Feb 12 22:24:13.811011 kubelet[2108]: I0212 22:24:13.810820 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/95fde9ca-69fc-453f-bba3-435f919b520f-var-lib-calico\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811011 kubelet[2108]: I0212 22:24:13.810844 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/95fde9ca-69fc-453f-bba3-435f919b520f-cni-bin-dir\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811011 kubelet[2108]: I0212 22:24:13.810873 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/95fde9ca-69fc-453f-bba3-435f919b520f-flexvol-driver-host\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811011 kubelet[2108]: I0212 22:24:13.810901 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c8hpf\" (UniqueName: \"kubernetes.io/projected/95fde9ca-69fc-453f-bba3-435f919b520f-kube-api-access-c8hpf\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811011 kubelet[2108]: I0212 22:24:13.810929 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/95fde9ca-69fc-453f-bba3-435f919b520f-policysync\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811255 kubelet[2108]: I0212 22:24:13.810958 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jxtmg\" (UniqueName: \"kubernetes.io/projected/4bdc8427-40c2-483c-b3fe-8f7529ac44f3-kube-api-access-jxtmg\") pod \"kube-proxy-sx9lg\" (UID: \"4bdc8427-40c2-483c-b3fe-8f7529ac44f3\") " pod="kube-system/kube-proxy-sx9lg" Feb 12 22:24:13.811255 kubelet[2108]: I0212 22:24:13.810991 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e94dc6ea-cdbf-422e-a5e4-f121be40444c-socket-dir\") pod \"csi-node-driver-ghldj\" (UID: \"e94dc6ea-cdbf-422e-a5e4-f121be40444c\") " pod="calico-system/csi-node-driver-ghldj" Feb 12 22:24:13.811255 kubelet[2108]: I0212 22:24:13.811036 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/95fde9ca-69fc-453f-bba3-435f919b520f-lib-modules\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811255 kubelet[2108]: I0212 22:24:13.811069 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/95fde9ca-69fc-453f-bba3-435f919b520f-xtables-lock\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811255 kubelet[2108]: I0212 22:24:13.811114 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/95fde9ca-69fc-453f-bba3-435f919b520f-tigera-ca-bundle\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811466 kubelet[2108]: I0212 22:24:13.811145 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/95fde9ca-69fc-453f-bba3-435f919b520f-cni-log-dir\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811466 kubelet[2108]: I0212 22:24:13.811176 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/95fde9ca-69fc-453f-bba3-435f919b520f-cni-net-dir\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811466 kubelet[2108]: I0212 22:24:13.811216 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4bdc8427-40c2-483c-b3fe-8f7529ac44f3-kube-proxy\") pod \"kube-proxy-sx9lg\" (UID: \"4bdc8427-40c2-483c-b3fe-8f7529ac44f3\") " pod="kube-system/kube-proxy-sx9lg" Feb 12 22:24:13.811466 kubelet[2108]: I0212 22:24:13.811283 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4bdc8427-40c2-483c-b3fe-8f7529ac44f3-xtables-lock\") pod \"kube-proxy-sx9lg\" (UID: \"4bdc8427-40c2-483c-b3fe-8f7529ac44f3\") " pod="kube-system/kube-proxy-sx9lg" Feb 12 22:24:13.811466 kubelet[2108]: I0212 22:24:13.811315 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e94dc6ea-cdbf-422e-a5e4-f121be40444c-varrun\") pod \"csi-node-driver-ghldj\" (UID: \"e94dc6ea-cdbf-422e-a5e4-f121be40444c\") " pod="calico-system/csi-node-driver-ghldj" Feb 12 22:24:13.811678 kubelet[2108]: I0212 22:24:13.811351 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e94dc6ea-cdbf-422e-a5e4-f121be40444c-registration-dir\") pod \"csi-node-driver-ghldj\" (UID: \"e94dc6ea-cdbf-422e-a5e4-f121be40444c\") " pod="calico-system/csi-node-driver-ghldj" Feb 12 22:24:13.811678 kubelet[2108]: I0212 22:24:13.811386 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jqjbf\" (UniqueName: \"kubernetes.io/projected/e94dc6ea-cdbf-422e-a5e4-f121be40444c-kube-api-access-jqjbf\") pod \"csi-node-driver-ghldj\" (UID: \"e94dc6ea-cdbf-422e-a5e4-f121be40444c\") " pod="calico-system/csi-node-driver-ghldj" Feb 12 22:24:13.811678 kubelet[2108]: I0212 22:24:13.811416 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/95fde9ca-69fc-453f-bba3-435f919b520f-node-certs\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811678 kubelet[2108]: I0212 22:24:13.811446 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/95fde9ca-69fc-453f-bba3-435f919b520f-var-run-calico\") pod \"calico-node-d6jvm\" (UID: \"95fde9ca-69fc-453f-bba3-435f919b520f\") " pod="calico-system/calico-node-d6jvm" Feb 12 22:24:13.811678 kubelet[2108]: I0212 22:24:13.811458 2108 reconciler.go:41] "Reconciler: start to sync state" Feb 12 22:24:13.913726 kubelet[2108]: E0212 22:24:13.913699 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:13.913926 kubelet[2108]: W0212 22:24:13.913910 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:13.914108 kubelet[2108]: E0212 22:24:13.914095 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:13.921875 kubelet[2108]: E0212 22:24:13.921850 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:13.921875 kubelet[2108]: W0212 22:24:13.921868 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:13.922021 kubelet[2108]: E0212 22:24:13.921891 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:13.964113 kubelet[2108]: E0212 22:24:13.963996 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:13.964113 kubelet[2108]: W0212 22:24:13.964019 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:13.964113 kubelet[2108]: E0212 22:24:13.964066 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.013035 kubelet[2108]: E0212 22:24:14.012979 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.013035 kubelet[2108]: W0212 22:24:14.013013 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.013252 kubelet[2108]: E0212 22:24:14.013057 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.013353 kubelet[2108]: E0212 22:24:14.013326 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.013353 kubelet[2108]: W0212 22:24:14.013341 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.013499 kubelet[2108]: E0212 22:24:14.013361 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.013576 kubelet[2108]: E0212 22:24:14.013560 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.013632 kubelet[2108]: W0212 22:24:14.013578 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.013632 kubelet[2108]: E0212 22:24:14.013593 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.114413 kubelet[2108]: E0212 22:24:14.114383 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.114413 kubelet[2108]: W0212 22:24:14.114405 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.114645 kubelet[2108]: E0212 22:24:14.114432 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.114717 kubelet[2108]: E0212 22:24:14.114666 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.114717 kubelet[2108]: W0212 22:24:14.114675 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.114717 kubelet[2108]: E0212 22:24:14.114693 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.115002 kubelet[2108]: E0212 22:24:14.114915 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.115002 kubelet[2108]: W0212 22:24:14.114996 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.115127 kubelet[2108]: E0212 22:24:14.115015 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.218296 kubelet[2108]: E0212 22:24:14.216134 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.218296 kubelet[2108]: W0212 22:24:14.216875 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.218296 kubelet[2108]: E0212 22:24:14.216911 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.218296 kubelet[2108]: E0212 22:24:14.217221 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.218296 kubelet[2108]: W0212 22:24:14.217231 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.218296 kubelet[2108]: E0212 22:24:14.217244 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.218296 kubelet[2108]: E0212 22:24:14.217481 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.218296 kubelet[2108]: W0212 22:24:14.217488 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.218296 kubelet[2108]: E0212 22:24:14.217499 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.318513 kubelet[2108]: E0212 22:24:14.318483 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.318513 kubelet[2108]: W0212 22:24:14.318504 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.318752 kubelet[2108]: E0212 22:24:14.318528 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.318816 kubelet[2108]: E0212 22:24:14.318809 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.319074 kubelet[2108]: W0212 22:24:14.318966 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.319074 kubelet[2108]: E0212 22:24:14.318997 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.319384 kubelet[2108]: E0212 22:24:14.319362 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.319384 kubelet[2108]: W0212 22:24:14.319377 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.319529 kubelet[2108]: E0212 22:24:14.319395 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.383684 kubelet[2108]: E0212 22:24:14.383661 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.384128 kubelet[2108]: W0212 22:24:14.383891 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.384323 kubelet[2108]: E0212 22:24:14.384310 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.420738 kubelet[2108]: E0212 22:24:14.420708 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.420738 kubelet[2108]: W0212 22:24:14.420729 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.421051 kubelet[2108]: E0212 22:24:14.420753 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.421118 kubelet[2108]: E0212 22:24:14.421075 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.421118 kubelet[2108]: W0212 22:24:14.421086 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.421118 kubelet[2108]: E0212 22:24:14.421103 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.444844 amazon-ssm-agent[1623]: 2024-02-12 22:24:14 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 12 22:24:14.522558 kubelet[2108]: E0212 22:24:14.522445 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.522558 kubelet[2108]: W0212 22:24:14.522469 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.522558 kubelet[2108]: E0212 22:24:14.522493 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.524278 kubelet[2108]: E0212 22:24:14.524252 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.524278 kubelet[2108]: W0212 22:24:14.524271 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.524630 kubelet[2108]: E0212 22:24:14.524342 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.575368 kubelet[2108]: E0212 22:24:14.575279 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.575368 kubelet[2108]: W0212 22:24:14.575352 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.576347 kubelet[2108]: E0212 22:24:14.575383 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.625042 kubelet[2108]: E0212 22:24:14.624979 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.625042 kubelet[2108]: W0212 22:24:14.625017 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.625225 kubelet[2108]: E0212 22:24:14.625068 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.627861 env[1647]: time="2024-02-12T22:24:14.627810358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sx9lg,Uid:4bdc8427-40c2-483c-b3fe-8f7529ac44f3,Namespace:kube-system,Attempt:0,}" Feb 12 22:24:14.635740 env[1647]: time="2024-02-12T22:24:14.633329923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d6jvm,Uid:95fde9ca-69fc-453f-bba3-435f919b520f,Namespace:calico-system,Attempt:0,}" Feb 12 22:24:14.709449 kubelet[2108]: E0212 22:24:14.709404 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:14.725717 kubelet[2108]: E0212 22:24:14.725686 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.725717 kubelet[2108]: W0212 22:24:14.725708 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.725898 kubelet[2108]: E0212 22:24:14.725732 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.770119 kubelet[2108]: E0212 22:24:14.770098 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:14.770379 kubelet[2108]: W0212 22:24:14.770362 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:14.770540 kubelet[2108]: E0212 22:24:14.770528 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:14.879618 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 12 22:24:14.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:14.886078 kernel: audit: type=1131 audit(1707776654.878:644): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:14.900000 audit: BPF prog-id=57 op=UNLOAD Feb 12 22:24:14.900000 audit: BPF prog-id=56 op=UNLOAD Feb 12 22:24:14.904235 kernel: audit: type=1334 audit(1707776654.900:645): prog-id=57 op=UNLOAD Feb 12 22:24:14.904292 kernel: audit: type=1334 audit(1707776654.900:646): prog-id=56 op=UNLOAD Feb 12 22:24:14.904332 kernel: audit: type=1334 audit(1707776654.900:647): prog-id=55 op=UNLOAD Feb 12 22:24:14.900000 audit: BPF prog-id=55 op=UNLOAD Feb 12 22:24:15.128703 kubelet[2108]: E0212 22:24:15.128319 2108 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:15.279971 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1246049717.mount: Deactivated successfully. Feb 12 22:24:15.291353 env[1647]: time="2024-02-12T22:24:15.291282134Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:15.292785 env[1647]: time="2024-02-12T22:24:15.292747894Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:15.298323 env[1647]: time="2024-02-12T22:24:15.298270730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:15.300851 env[1647]: time="2024-02-12T22:24:15.300813771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:15.304489 env[1647]: time="2024-02-12T22:24:15.304452263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:15.309476 env[1647]: time="2024-02-12T22:24:15.309432900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:15.310756 env[1647]: time="2024-02-12T22:24:15.310719976Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:15.312175 env[1647]: time="2024-02-12T22:24:15.312144956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:15.354386 env[1647]: time="2024-02-12T22:24:15.354306129Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:24:15.358204 env[1647]: time="2024-02-12T22:24:15.354397974Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:24:15.358204 env[1647]: time="2024-02-12T22:24:15.354427111Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:24:15.358362 env[1647]: time="2024-02-12T22:24:15.358266515Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b202f25d95020fa77d631831a8b43d0aa53c7e74e85912e47b274a3c69b9be88 pid=2228 runtime=io.containerd.runc.v2 Feb 12 22:24:15.369806 env[1647]: time="2024-02-12T22:24:15.369713494Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:24:15.369806 env[1647]: time="2024-02-12T22:24:15.369763225Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:24:15.370070 env[1647]: time="2024-02-12T22:24:15.369794338Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:24:15.370335 env[1647]: time="2024-02-12T22:24:15.370294298Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f0efb709d4b717543a0d843f035b0667e4811e62e3ca5d46302b5fcf2adb20f1 pid=2237 runtime=io.containerd.runc.v2 Feb 12 22:24:15.404241 systemd[1]: Started cri-containerd-f0efb709d4b717543a0d843f035b0667e4811e62e3ca5d46302b5fcf2adb20f1.scope. Feb 12 22:24:15.417217 systemd[1]: Started cri-containerd-b202f25d95020fa77d631831a8b43d0aa53c7e74e85912e47b274a3c69b9be88.scope. Feb 12 22:24:15.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.455071 kernel: audit: type=1400 audit(1707776655.448:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.453000 audit: BPF prog-id=73 op=LOAD Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2237 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:15.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630656662373039643462373137353433613064383433663033356230 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2237 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:15.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630656662373039643462373137353433613064383433663033356230 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit: BPF prog-id=74 op=LOAD Feb 12 22:24:15.454000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000024c70 items=0 ppid=2237 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:15.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630656662373039643462373137353433613064383433663033356230 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit: BPF prog-id=75 op=LOAD Feb 12 22:24:15.454000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000024cb8 items=0 ppid=2237 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:15.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630656662373039643462373137353433613064383433663033356230 Feb 12 22:24:15.454000 audit: BPF prog-id=75 op=UNLOAD Feb 12 22:24:15.454000 audit: BPF prog-id=74 op=UNLOAD Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.454000 audit: BPF prog-id=76 op=LOAD Feb 12 22:24:15.454000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000250c8 items=0 ppid=2237 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:15.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630656662373039643462373137353433613064383433663033356230 Feb 12 22:24:15.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.470000 audit: BPF prog-id=77 op=LOAD Feb 12 22:24:15.471000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.471000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2228 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:15.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303266323564393530323066613737643633313833316138623433 Feb 12 22:24:15.471000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.471000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2228 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:15.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303266323564393530323066613737643633313833316138623433 Feb 12 22:24:15.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.472000 audit: BPF prog-id=78 op=LOAD Feb 12 22:24:15.472000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c4150 items=0 ppid=2228 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:15.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303266323564393530323066613737643633313833316138623433 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit: BPF prog-id=79 op=LOAD Feb 12 22:24:15.475000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c4198 items=0 ppid=2228 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:15.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303266323564393530323066613737643633313833316138623433 Feb 12 22:24:15.475000 audit: BPF prog-id=79 op=UNLOAD Feb 12 22:24:15.475000 audit: BPF prog-id=78 op=UNLOAD Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:15.475000 audit: BPF prog-id=80 op=LOAD Feb 12 22:24:15.475000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c45a8 items=0 ppid=2228 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:15.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303266323564393530323066613737643633313833316138623433 Feb 12 22:24:15.479263 env[1647]: time="2024-02-12T22:24:15.479208712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sx9lg,Uid:4bdc8427-40c2-483c-b3fe-8f7529ac44f3,Namespace:kube-system,Attempt:0,} returns sandbox id \"f0efb709d4b717543a0d843f035b0667e4811e62e3ca5d46302b5fcf2adb20f1\"" Feb 12 22:24:15.483528 env[1647]: time="2024-02-12T22:24:15.483257165Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 22:24:15.509977 env[1647]: time="2024-02-12T22:24:15.509922000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d6jvm,Uid:95fde9ca-69fc-453f-bba3-435f919b520f,Namespace:calico-system,Attempt:0,} returns sandbox id \"b202f25d95020fa77d631831a8b43d0aa53c7e74e85912e47b274a3c69b9be88\"" Feb 12 22:24:15.710015 kubelet[2108]: E0212 22:24:15.709972 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:16.710851 kubelet[2108]: E0212 22:24:16.710823 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:16.787881 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2109018308.mount: Deactivated successfully. Feb 12 22:24:17.124343 kubelet[2108]: E0212 22:24:17.124313 2108 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:17.575654 env[1647]: time="2024-02-12T22:24:17.575599396Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:17.578511 env[1647]: time="2024-02-12T22:24:17.578466983Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:17.580396 env[1647]: time="2024-02-12T22:24:17.580358261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:17.582887 env[1647]: time="2024-02-12T22:24:17.582854692Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:17.583311 env[1647]: time="2024-02-12T22:24:17.583278043Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 22:24:17.583955 kubelet[2108]: E0212 22:24:17.583923 2108 kuberuntime_manager.go:872] container &Container{Name:kube-proxy,Image:registry.k8s.io/kube-proxy:v1.26.13,Command:[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME)],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-proxy,ReadOnly:false,MountPath:/var/lib/kube-proxy,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:xtables-lock,ReadOnly:false,MountPath:/run/xtables.lock,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:lib-modules,ReadOnly:true,MountPath:/lib/modules,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-jxtmg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod kube-proxy-sx9lg_kube-system(4bdc8427-40c2-483c-b3fe-8f7529ac44f3): CreateContainerConfigError: services have not yet been read at least once, cannot construct envvars Feb 12 22:24:17.584224 kubelet[2108]: E0212 22:24:17.583984 2108 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-proxy\" with CreateContainerConfigError: \"services have not yet been read at least once, cannot construct envvars\"" pod="kube-system/kube-proxy-sx9lg" podUID=4bdc8427-40c2-483c-b3fe-8f7529ac44f3 Feb 12 22:24:17.584738 env[1647]: time="2024-02-12T22:24:17.584683204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 22:24:17.711318 kubelet[2108]: E0212 22:24:17.711271 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:18.160473 env[1647]: time="2024-02-12T22:24:18.160434947Z" level=info msg="CreateContainer within sandbox \"f0efb709d4b717543a0d843f035b0667e4811e62e3ca5d46302b5fcf2adb20f1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 22:24:18.181786 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount251229828.mount: Deactivated successfully. Feb 12 22:24:18.190204 env[1647]: time="2024-02-12T22:24:18.190150277Z" level=info msg="CreateContainer within sandbox \"f0efb709d4b717543a0d843f035b0667e4811e62e3ca5d46302b5fcf2adb20f1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2d93ebc01d8ff0f7e189f152ab869eb637001e17704edf11acc2f94671fa8550\"" Feb 12 22:24:18.191324 env[1647]: time="2024-02-12T22:24:18.191226945Z" level=info msg="StartContainer for \"2d93ebc01d8ff0f7e189f152ab869eb637001e17704edf11acc2f94671fa8550\"" Feb 12 22:24:18.222180 systemd[1]: Started cri-containerd-2d93ebc01d8ff0f7e189f152ab869eb637001e17704edf11acc2f94671fa8550.scope. Feb 12 22:24:18.250558 kernel: kauditd_printk_skb: 113 callbacks suppressed Feb 12 22:24:18.250679 kernel: audit: type=1400 audit(1707776658.243:684): avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f35e2b487c8 items=0 ppid=2237 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.256763 kubelet[2108]: E0212 22:24:18.256600 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.256763 kubelet[2108]: W0212 22:24:18.256624 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.256763 kubelet[2108]: E0212 22:24:18.256651 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.258343 kubelet[2108]: E0212 22:24:18.258320 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.258343 kubelet[2108]: W0212 22:24:18.258337 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.258535 kubelet[2108]: E0212 22:24:18.258359 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.258607 kubelet[2108]: E0212 22:24:18.258593 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.258651 kubelet[2108]: W0212 22:24:18.258609 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.258651 kubelet[2108]: E0212 22:24:18.258626 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393365626330316438666630663765313839663135326162383639 Feb 12 22:24:18.262244 kubelet[2108]: E0212 22:24:18.262115 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.262244 kubelet[2108]: W0212 22:24:18.262131 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.262244 kubelet[2108]: E0212 22:24:18.262152 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.265286 kernel: audit: type=1300 audit(1707776658.243:684): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f35e2b487c8 items=0 ppid=2237 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.265380 kernel: audit: type=1327 audit(1707776658.243:684): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393365626330316438666630663765313839663135326162383639 Feb 12 22:24:18.266061 kubelet[2108]: E0212 22:24:18.265671 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.266061 kubelet[2108]: W0212 22:24:18.265689 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.266061 kubelet[2108]: E0212 22:24:18.265710 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.267707 kubelet[2108]: E0212 22:24:18.266300 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.267707 kubelet[2108]: W0212 22:24:18.266313 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.267707 kubelet[2108]: E0212 22:24:18.266331 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.269291 kubelet[2108]: E0212 22:24:18.269269 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.269421 kubelet[2108]: W0212 22:24:18.269403 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.269618 kubelet[2108]: E0212 22:24:18.269602 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.270200 kubelet[2108]: E0212 22:24:18.270151 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.270378 kubelet[2108]: W0212 22:24:18.270361 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.271225 kubelet[2108]: E0212 22:24:18.271204 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.271652 kubelet[2108]: E0212 22:24:18.271641 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.271739 kubelet[2108]: W0212 22:24:18.271728 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.271821 kubelet[2108]: E0212 22:24:18.271812 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.272207 kubelet[2108]: E0212 22:24:18.272194 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.272298 kubelet[2108]: W0212 22:24:18.272286 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.272391 kubelet[2108]: E0212 22:24:18.272381 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.272646 kubelet[2108]: E0212 22:24:18.272635 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.272943 kubelet[2108]: W0212 22:24:18.272930 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.273015 kubelet[2108]: E0212 22:24:18.273008 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.284076 kernel: audit: type=1400 audit(1707776658.243:685): avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.284183 kernel: audit: type=1400 audit(1707776658.243:685): avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.284210 kernel: audit: type=1400 audit(1707776658.243:685): avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.284731 kubelet[2108]: E0212 22:24:18.284555 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.284731 kubelet[2108]: W0212 22:24:18.284577 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.284731 kubelet[2108]: E0212 22:24:18.284606 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.288596 kubelet[2108]: E0212 22:24:18.288311 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.288596 kubelet[2108]: W0212 22:24:18.288330 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.288596 kubelet[2108]: E0212 22:24:18.288356 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.289214 env[1647]: time="2024-02-12T22:24:18.288994515Z" level=info msg="StartContainer for \"2d93ebc01d8ff0f7e189f152ab869eb637001e17704edf11acc2f94671fa8550\" returns successfully" Feb 12 22:24:18.294691 kernel: audit: type=1400 audit(1707776658.243:685): avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.295153 kubelet[2108]: E0212 22:24:18.294882 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.295153 kubelet[2108]: W0212 22:24:18.294900 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.295153 kubelet[2108]: E0212 22:24:18.294925 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.300385 kernel: audit: type=1400 audit(1707776658.243:685): avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.300807 kubelet[2108]: E0212 22:24:18.300548 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.300807 kubelet[2108]: W0212 22:24:18.300566 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.300807 kubelet[2108]: E0212 22:24:18.300592 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.306078 kernel: audit: type=1400 audit(1707776658.243:685): avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.306519 kubelet[2108]: E0212 22:24:18.306231 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.306519 kubelet[2108]: W0212 22:24:18.306260 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.306519 kubelet[2108]: E0212 22:24:18.306289 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.312052 kernel: audit: type=1400 audit(1707776658.243:685): avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.243000 audit: BPF prog-id=81 op=LOAD Feb 12 22:24:18.243000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00030c6a8 items=0 ppid=2237 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393365626330316438666630663765313839663135326162383639 Feb 12 22:24:18.246000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.246000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.246000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.246000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.246000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.246000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.246000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.246000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.246000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.246000 audit: BPF prog-id=82 op=LOAD Feb 12 22:24:18.246000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00030c6f8 items=0 ppid=2237 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393365626330316438666630663765313839663135326162383639 Feb 12 22:24:18.250000 audit: BPF prog-id=82 op=UNLOAD Feb 12 22:24:18.250000 audit: BPF prog-id=81 op=UNLOAD Feb 12 22:24:18.250000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.250000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.250000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.250000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.250000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.250000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.250000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.250000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.250000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.250000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:18.250000 audit: BPF prog-id=83 op=LOAD Feb 12 22:24:18.250000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00030c788 items=0 ppid=2237 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393365626330316438666630663765313839663135326162383639 Feb 12 22:24:18.352811 kubelet[2108]: E0212 22:24:18.352323 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.352811 kubelet[2108]: W0212 22:24:18.352351 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.352811 kubelet[2108]: E0212 22:24:18.352373 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.352811 kubelet[2108]: E0212 22:24:18.352664 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.352811 kubelet[2108]: W0212 22:24:18.352673 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.352811 kubelet[2108]: E0212 22:24:18.352692 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.353443 kubelet[2108]: E0212 22:24:18.353298 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.353443 kubelet[2108]: W0212 22:24:18.353311 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.353443 kubelet[2108]: E0212 22:24:18.353340 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.353769 kubelet[2108]: E0212 22:24:18.353639 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.353769 kubelet[2108]: W0212 22:24:18.353648 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.353769 kubelet[2108]: E0212 22:24:18.353669 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.354551 kubelet[2108]: E0212 22:24:18.353954 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.354551 kubelet[2108]: W0212 22:24:18.353964 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.354551 kubelet[2108]: E0212 22:24:18.353997 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.354551 kubelet[2108]: E0212 22:24:18.354237 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.354551 kubelet[2108]: W0212 22:24:18.354247 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.354551 kubelet[2108]: E0212 22:24:18.354272 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.354551 kubelet[2108]: E0212 22:24:18.354459 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.354551 kubelet[2108]: W0212 22:24:18.354465 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.354551 kubelet[2108]: E0212 22:24:18.354483 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.355127 kubelet[2108]: E0212 22:24:18.354929 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.355127 kubelet[2108]: W0212 22:24:18.354938 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.355127 kubelet[2108]: E0212 22:24:18.354970 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.355533 kubelet[2108]: E0212 22:24:18.355320 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.355533 kubelet[2108]: W0212 22:24:18.355329 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.355533 kubelet[2108]: E0212 22:24:18.355359 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.355819 kubelet[2108]: E0212 22:24:18.355803 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.355888 kubelet[2108]: W0212 22:24:18.355820 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.355888 kubelet[2108]: E0212 22:24:18.355840 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.356231 kubelet[2108]: E0212 22:24:18.356220 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.356315 kubelet[2108]: W0212 22:24:18.356305 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.356417 kubelet[2108]: E0212 22:24:18.356407 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.357886 kubelet[2108]: E0212 22:24:18.356656 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:18.357886 kubelet[2108]: W0212 22:24:18.356668 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:18.357886 kubelet[2108]: E0212 22:24:18.356686 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:18.359000 audit[2383]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.359000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0c6e20d0 a2=0 a3=7ffe0c6e20bc items=0 ppid=2317 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:24:18.361000 audit[2384]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.361000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd34c25ff0 a2=0 a3=7ffd34c25fdc items=0 ppid=2317 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:24:18.362000 audit[2385]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.362000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdebdf8d0 a2=0 a3=7ffcdebdf8bc items=0 ppid=2317 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.362000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:24:18.363000 audit[2386]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.363000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd54a98df0 a2=0 a3=7ffd54a98ddc items=0 ppid=2317 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:24:18.367000 audit[2387]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.367000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd88b0550 a2=0 a3=7ffdd88b053c items=0 ppid=2317 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:24:18.369000 audit[2388]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.369000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3ab98590 a2=0 a3=7fff3ab9857c items=0 ppid=2317 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:24:18.460000 audit[2389]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.460000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc58b193f0 a2=0 a3=7ffc58b193dc items=0 ppid=2317 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:24:18.464000 audit[2391]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.464000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc8db7f990 a2=0 a3=7ffc8db7f97c items=0 ppid=2317 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 22:24:18.468000 audit[2394]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.468000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe64f27470 a2=0 a3=7ffe64f2745c items=0 ppid=2317 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 22:24:18.470000 audit[2395]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.470000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9d8d2de0 a2=0 a3=7ffd9d8d2dcc items=0 ppid=2317 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:24:18.473000 audit[2397]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.473000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff45f8f440 a2=0 a3=7fff45f8f42c items=0 ppid=2317 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.473000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:24:18.474000 audit[2398]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.474000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee27197a0 a2=0 a3=7ffee271978c items=0 ppid=2317 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:24:18.477000 audit[2400]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.477000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeed84aaf0 a2=0 a3=7ffeed84aadc items=0 ppid=2317 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:24:18.482000 audit[2403]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.482000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff5c07dd40 a2=0 a3=7fff5c07dd2c items=0 ppid=2317 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 22:24:18.484000 audit[2404]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.484000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5d2b2710 a2=0 a3=7fff5d2b26fc items=0 ppid=2317 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:24:18.487000 audit[2406]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.487000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffcaf3ae60 a2=0 a3=7fffcaf3ae4c items=0 ppid=2317 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:24:18.489000 audit[2407]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.489000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe97691e70 a2=0 a3=7ffe97691e5c items=0 ppid=2317 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:24:18.492000 audit[2409]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.492000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc07197020 a2=0 a3=7ffc0719700c items=0 ppid=2317 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:24:18.496000 audit[2412]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.496000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb2b64880 a2=0 a3=7ffeb2b6486c items=0 ppid=2317 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:24:18.501000 audit[2415]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.501000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5a425b40 a2=0 a3=7fff5a425b2c items=0 ppid=2317 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:24:18.502000 audit[2416]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.502000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffceea557f0 a2=0 a3=7ffceea557dc items=0 ppid=2317 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:24:18.505000 audit[2418]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.505000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffef4544130 a2=0 a3=7ffef454411c items=0 ppid=2317 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:24:18.511000 audit[2421]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:24:18.511000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcfb45cc50 a2=0 a3=7ffcfb45cc3c items=0 ppid=2317 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:24:18.520000 audit[2425]: NETFILTER_CFG table=filter:58 family=2 entries=3 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:18.520000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd6fc595d0 a2=0 a3=7ffd6fc595bc items=0 ppid=2317 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:18.610000 audit[2425]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:18.610000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd6fc595d0 a2=0 a3=7ffd6fc595bc items=0 ppid=2317 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:18.636000 audit[2432]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.636000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffead6d8ea0 a2=0 a3=7ffead6d8e8c items=0 ppid=2317 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:24:18.642000 audit[2434]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.642000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4a043560 a2=0 a3=7ffe4a04354c items=0 ppid=2317 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 22:24:18.651000 audit[2437]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.651000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffed89ce890 a2=0 a3=7ffed89ce87c items=0 ppid=2317 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 22:24:18.653000 audit[2438]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.653000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebdf064a0 a2=0 a3=7ffebdf0648c items=0 ppid=2317 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:24:18.657000 audit[2440]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.657000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0c93d800 a2=0 a3=7fff0c93d7ec items=0 ppid=2317 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:24:18.659000 audit[2441]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.659000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff27b18850 a2=0 a3=7fff27b1883c items=0 ppid=2317 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:24:18.666000 audit[2443]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.666000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd39958f40 a2=0 a3=7ffd39958f2c items=0 ppid=2317 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 22:24:18.672000 audit[2446]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.672000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc33526fc0 a2=0 a3=7ffc33526fac items=0 ppid=2317 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:24:18.673000 audit[2447]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.673000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff319d2850 a2=0 a3=7fff319d283c items=0 ppid=2317 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:24:18.678000 audit[2449]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.678000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc1bb7730 a2=0 a3=7ffcc1bb771c items=0 ppid=2317 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:24:18.679000 audit[2450]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.679000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd68c836d0 a2=0 a3=7ffd68c836bc items=0 ppid=2317 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:24:18.682000 audit[2452]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.682000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff16ad0b70 a2=0 a3=7fff16ad0b5c items=0 ppid=2317 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:24:18.686000 audit[2455]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.686000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa77832e0 a2=0 a3=7fffa77832cc items=0 ppid=2317 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:24:18.690000 audit[2458]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.690000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0df61aa0 a2=0 a3=7ffe0df61a8c items=0 ppid=2317 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.690000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 22:24:18.694000 audit[2459]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=2459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.694000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffceda67530 a2=0 a3=7ffceda6751c items=0 ppid=2317 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.694000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:24:18.697000 audit[2461]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=2461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.698259 kubelet[2108]: E0212 22:24:18.698181 2108 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:18.697000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe272f2ba0 a2=0 a3=7ffe272f2b8c items=0 ppid=2317 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:24:18.701000 audit[2464]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:24:18.701000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff508098b0 a2=0 a3=7fff5080989c items=0 ppid=2317 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.701000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:24:18.708000 audit[2468]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:24:18.708000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc6f81d140 a2=0 a3=7ffc6f81d12c items=0 ppid=2317 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.708000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:18.710000 audit[2468]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:24:18.710000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc6f81d140 a2=0 a3=7ffc6f81d12c items=0 ppid=2317 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:18.710000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:18.711830 kubelet[2108]: E0212 22:24:18.711773 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:19.124621 kubelet[2108]: E0212 22:24:19.124281 2108 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:19.177303 kubelet[2108]: I0212 22:24:19.177265 2108 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-sx9lg" podStartSLOduration=-9.223372028677551e+09 pod.CreationTimestamp="2024-02-12 22:24:11 +0000 UTC" firstStartedPulling="2024-02-12 22:24:15.481206526 +0000 UTC m=+17.309752638" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:24:19.176680153 +0000 UTC m=+21.005226287" watchObservedRunningTime="2024-02-12 22:24:19.177225011 +0000 UTC m=+21.005771145" Feb 12 22:24:19.211844 kubelet[2108]: E0212 22:24:19.211806 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.211844 kubelet[2108]: W0212 22:24:19.211840 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.212080 kubelet[2108]: E0212 22:24:19.211863 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.212133 kubelet[2108]: E0212 22:24:19.212092 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.212133 kubelet[2108]: W0212 22:24:19.212102 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.212133 kubelet[2108]: E0212 22:24:19.212122 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.212376 kubelet[2108]: E0212 22:24:19.212315 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.212376 kubelet[2108]: W0212 22:24:19.212323 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.212376 kubelet[2108]: E0212 22:24:19.212338 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.212554 kubelet[2108]: E0212 22:24:19.212537 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.212554 kubelet[2108]: W0212 22:24:19.212551 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.212685 kubelet[2108]: E0212 22:24:19.212565 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.212751 kubelet[2108]: E0212 22:24:19.212731 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.212751 kubelet[2108]: W0212 22:24:19.212743 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.212865 kubelet[2108]: E0212 22:24:19.212759 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.212932 kubelet[2108]: E0212 22:24:19.212923 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.212987 kubelet[2108]: W0212 22:24:19.212934 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.212987 kubelet[2108]: E0212 22:24:19.212947 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.213174 kubelet[2108]: E0212 22:24:19.213161 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.213245 kubelet[2108]: W0212 22:24:19.213174 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.213245 kubelet[2108]: E0212 22:24:19.213189 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.213367 kubelet[2108]: E0212 22:24:19.213356 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.213427 kubelet[2108]: W0212 22:24:19.213367 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.213427 kubelet[2108]: E0212 22:24:19.213383 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.213560 kubelet[2108]: E0212 22:24:19.213545 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.213560 kubelet[2108]: W0212 22:24:19.213558 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.213655 kubelet[2108]: E0212 22:24:19.213572 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.213849 kubelet[2108]: E0212 22:24:19.213830 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.213849 kubelet[2108]: W0212 22:24:19.213844 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.214002 kubelet[2108]: E0212 22:24:19.213861 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.214100 kubelet[2108]: E0212 22:24:19.214080 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.214100 kubelet[2108]: W0212 22:24:19.214093 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.214220 kubelet[2108]: E0212 22:24:19.214109 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.214311 kubelet[2108]: E0212 22:24:19.214293 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.214311 kubelet[2108]: W0212 22:24:19.214305 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.214443 kubelet[2108]: E0212 22:24:19.214320 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.214529 kubelet[2108]: E0212 22:24:19.214510 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.214529 kubelet[2108]: W0212 22:24:19.214523 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.214680 kubelet[2108]: E0212 22:24:19.214538 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.214746 kubelet[2108]: E0212 22:24:19.214736 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.214815 kubelet[2108]: W0212 22:24:19.214746 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.214815 kubelet[2108]: E0212 22:24:19.214763 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.214955 kubelet[2108]: E0212 22:24:19.214936 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.214955 kubelet[2108]: W0212 22:24:19.214950 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.215111 kubelet[2108]: E0212 22:24:19.214965 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.215172 kubelet[2108]: E0212 22:24:19.215159 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.215229 kubelet[2108]: W0212 22:24:19.215173 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.215229 kubelet[2108]: E0212 22:24:19.215188 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.258659 kubelet[2108]: E0212 22:24:19.258617 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.258659 kubelet[2108]: W0212 22:24:19.258640 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.258659 kubelet[2108]: E0212 22:24:19.258678 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.259170 kubelet[2108]: E0212 22:24:19.259144 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.259374 kubelet[2108]: W0212 22:24:19.259181 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.259374 kubelet[2108]: E0212 22:24:19.259209 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.259576 kubelet[2108]: E0212 22:24:19.259562 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.259651 kubelet[2108]: W0212 22:24:19.259631 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.259712 kubelet[2108]: E0212 22:24:19.259661 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.260514 kubelet[2108]: E0212 22:24:19.260491 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.260514 kubelet[2108]: W0212 22:24:19.260509 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.260677 kubelet[2108]: E0212 22:24:19.260533 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.260763 kubelet[2108]: E0212 22:24:19.260741 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.260763 kubelet[2108]: W0212 22:24:19.260755 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.261187 kubelet[2108]: E0212 22:24:19.260959 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.264840 kubelet[2108]: E0212 22:24:19.264821 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.264996 kubelet[2108]: W0212 22:24:19.264981 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.265108 kubelet[2108]: E0212 22:24:19.265097 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.268837 kubelet[2108]: E0212 22:24:19.268805 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.269001 kubelet[2108]: W0212 22:24:19.268985 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.269113 kubelet[2108]: E0212 22:24:19.269102 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.269971 kubelet[2108]: E0212 22:24:19.269954 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.270145 kubelet[2108]: W0212 22:24:19.270131 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.270296 kubelet[2108]: E0212 22:24:19.270274 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.270708 kubelet[2108]: E0212 22:24:19.270694 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.271157 kubelet[2108]: W0212 22:24:19.271141 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.271397 kubelet[2108]: E0212 22:24:19.271384 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.271927 kubelet[2108]: E0212 22:24:19.271906 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.272744 kubelet[2108]: W0212 22:24:19.272724 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.272932 kubelet[2108]: E0212 22:24:19.272918 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.275231 kubelet[2108]: E0212 22:24:19.275213 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.275375 kubelet[2108]: W0212 22:24:19.275231 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.275375 kubelet[2108]: E0212 22:24:19.275310 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.326685 kubelet[2108]: E0212 22:24:19.276093 2108 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:24:19.326685 kubelet[2108]: W0212 22:24:19.276105 2108 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:24:19.326685 kubelet[2108]: E0212 22:24:19.276128 2108 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:24:19.712532 kubelet[2108]: E0212 22:24:19.712485 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:19.931361 env[1647]: time="2024-02-12T22:24:19.931311562Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:19.934693 env[1647]: time="2024-02-12T22:24:19.934599782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:19.938849 env[1647]: time="2024-02-12T22:24:19.938779580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:19.955196 env[1647]: time="2024-02-12T22:24:19.955136212Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:19.957062 env[1647]: time="2024-02-12T22:24:19.956972808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 22:24:19.959993 env[1647]: time="2024-02-12T22:24:19.959957295Z" level=info msg="CreateContainer within sandbox \"b202f25d95020fa77d631831a8b43d0aa53c7e74e85912e47b274a3c69b9be88\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 22:24:19.975865 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3610362070.mount: Deactivated successfully. Feb 12 22:24:20.022573 env[1647]: time="2024-02-12T22:24:20.022388948Z" level=info msg="CreateContainer within sandbox \"b202f25d95020fa77d631831a8b43d0aa53c7e74e85912e47b274a3c69b9be88\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"515b050da8c1626c462a41532960e37a08c2671d7bf2cf2871f27579cc04d8b8\"" Feb 12 22:24:20.023374 env[1647]: time="2024-02-12T22:24:20.023339332Z" level=info msg="StartContainer for \"515b050da8c1626c462a41532960e37a08c2671d7bf2cf2871f27579cc04d8b8\"" Feb 12 22:24:20.055461 systemd[1]: Started cri-containerd-515b050da8c1626c462a41532960e37a08c2671d7bf2cf2871f27579cc04d8b8.scope. Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f9580063448 items=0 ppid=2228 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:20.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531356230353064613863313632366334363261343135333239363065 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit: BPF prog-id=84 op=LOAD Feb 12 22:24:20.075000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00021a828 items=0 ppid=2228 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:20.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531356230353064613863313632366334363261343135333239363065 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit: BPF prog-id=85 op=LOAD Feb 12 22:24:20.075000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00021a878 items=0 ppid=2228 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:20.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531356230353064613863313632366334363261343135333239363065 Feb 12 22:24:20.075000 audit: BPF prog-id=85 op=UNLOAD Feb 12 22:24:20.075000 audit: BPF prog-id=84 op=UNLOAD Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { perfmon } for pid=2506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit[2506]: AVC avc: denied { bpf } for pid=2506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:20.075000 audit: BPF prog-id=86 op=LOAD Feb 12 22:24:20.075000 audit[2506]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00021a908 items=0 ppid=2228 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:20.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531356230353064613863313632366334363261343135333239363065 Feb 12 22:24:20.101440 env[1647]: time="2024-02-12T22:24:20.101394099Z" level=info msg="StartContainer for \"515b050da8c1626c462a41532960e37a08c2671d7bf2cf2871f27579cc04d8b8\" returns successfully" Feb 12 22:24:20.117375 systemd[1]: cri-containerd-515b050da8c1626c462a41532960e37a08c2671d7bf2cf2871f27579cc04d8b8.scope: Deactivated successfully. Feb 12 22:24:20.120000 audit: BPF prog-id=86 op=UNLOAD Feb 12 22:24:20.175863 systemd[1]: run-containerd-runc-k8s.io-515b050da8c1626c462a41532960e37a08c2671d7bf2cf2871f27579cc04d8b8-runc.iL9OMz.mount: Deactivated successfully. Feb 12 22:24:20.175983 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-515b050da8c1626c462a41532960e37a08c2671d7bf2cf2871f27579cc04d8b8-rootfs.mount: Deactivated successfully. Feb 12 22:24:20.714988 kubelet[2108]: E0212 22:24:20.714369 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:21.117446 env[1647]: time="2024-02-12T22:24:21.117387747Z" level=info msg="shim disconnected" id=515b050da8c1626c462a41532960e37a08c2671d7bf2cf2871f27579cc04d8b8 Feb 12 22:24:21.117446 env[1647]: time="2024-02-12T22:24:21.117439840Z" level=warning msg="cleaning up after shim disconnected" id=515b050da8c1626c462a41532960e37a08c2671d7bf2cf2871f27579cc04d8b8 namespace=k8s.io Feb 12 22:24:21.117446 env[1647]: time="2024-02-12T22:24:21.117452120Z" level=info msg="cleaning up dead shim" Feb 12 22:24:21.123742 kubelet[2108]: E0212 22:24:21.123712 2108 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:21.132816 env[1647]: time="2024-02-12T22:24:21.132769518Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:24:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2549 runtime=io.containerd.runc.v2\n" Feb 12 22:24:21.176486 env[1647]: time="2024-02-12T22:24:21.176422731Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 22:24:21.716047 kubelet[2108]: E0212 22:24:21.715975 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:22.718000 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2905132926.mount: Deactivated successfully. Feb 12 22:24:22.718848 kubelet[2108]: E0212 22:24:22.718241 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:23.123631 kubelet[2108]: E0212 22:24:23.123129 2108 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:23.719178 kubelet[2108]: E0212 22:24:23.719122 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:24.719268 kubelet[2108]: E0212 22:24:24.719227 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:25.126467 kubelet[2108]: E0212 22:24:25.126432 2108 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:25.719739 kubelet[2108]: E0212 22:24:25.719702 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:26.720086 kubelet[2108]: E0212 22:24:26.720046 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:27.124043 kubelet[2108]: E0212 22:24:27.123254 2108 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:27.720243 kubelet[2108]: E0212 22:24:27.720185 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:27.846099 env[1647]: time="2024-02-12T22:24:27.846050176Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:27.848998 env[1647]: time="2024-02-12T22:24:27.848953728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:27.856071 env[1647]: time="2024-02-12T22:24:27.856014039Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:27.858536 env[1647]: time="2024-02-12T22:24:27.858496307Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:27.859599 env[1647]: time="2024-02-12T22:24:27.859564182Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 22:24:27.862096 env[1647]: time="2024-02-12T22:24:27.862065313Z" level=info msg="CreateContainer within sandbox \"b202f25d95020fa77d631831a8b43d0aa53c7e74e85912e47b274a3c69b9be88\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 22:24:27.879286 env[1647]: time="2024-02-12T22:24:27.879212463Z" level=info msg="CreateContainer within sandbox \"b202f25d95020fa77d631831a8b43d0aa53c7e74e85912e47b274a3c69b9be88\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"796700bdba7ba3b2844ef889e1072ae5c64859a65db879a52130928e05704114\"" Feb 12 22:24:27.880077 env[1647]: time="2024-02-12T22:24:27.880041112Z" level=info msg="StartContainer for \"796700bdba7ba3b2844ef889e1072ae5c64859a65db879a52130928e05704114\"" Feb 12 22:24:27.910128 systemd[1]: run-containerd-runc-k8s.io-796700bdba7ba3b2844ef889e1072ae5c64859a65db879a52130928e05704114-runc.wfEts3.mount: Deactivated successfully. Feb 12 22:24:27.914322 systemd[1]: Started cri-containerd-796700bdba7ba3b2844ef889e1072ae5c64859a65db879a52130928e05704114.scope. Feb 12 22:24:27.943506 kernel: kauditd_printk_skb: 209 callbacks suppressed Feb 12 22:24:27.943663 kernel: audit: type=1400 audit(1707776667.931:741): avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.943710 kernel: audit: type=1300 audit(1707776667.931:741): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe99b5b68f8 items=0 ppid=2228 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe99b5b68f8 items=0 ppid=2228 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:27.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739363730306264626137626133623238343465663838396531303732 Feb 12 22:24:27.950059 kernel: audit: type=1327 audit(1707776667.931:741): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739363730306264626137626133623238343465663838396531303732 Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.955091 kernel: audit: type=1400 audit(1707776667.931:742): avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.964825 kernel: audit: type=1400 audit(1707776667.931:742): avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.964929 kernel: audit: type=1400 audit(1707776667.931:742): avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.969983 env[1647]: time="2024-02-12T22:24:27.969940443Z" level=info msg="StartContainer for \"796700bdba7ba3b2844ef889e1072ae5c64859a65db879a52130928e05704114\" returns successfully" Feb 12 22:24:27.970170 kernel: audit: type=1400 audit(1707776667.931:742): avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.978054 kernel: audit: type=1400 audit(1707776667.931:742): avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.990523 kernel: audit: type=1400 audit(1707776667.931:742): avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.990619 kernel: audit: type=1400 audit(1707776667.931:742): avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.931000 audit: BPF prog-id=87 op=LOAD Feb 12 22:24:27.931000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e3d58 items=0 ppid=2228 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:27.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739363730306264626137626133623238343465663838396531303732 Feb 12 22:24:27.932000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.932000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.932000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.932000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.932000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.932000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.932000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.932000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.932000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.932000 audit: BPF prog-id=88 op=LOAD Feb 12 22:24:27.932000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e3da8 items=0 ppid=2228 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:27.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739363730306264626137626133623238343465663838396531303732 Feb 12 22:24:27.942000 audit: BPF prog-id=88 op=UNLOAD Feb 12 22:24:27.942000 audit: BPF prog-id=87 op=UNLOAD Feb 12 22:24:27.942000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.942000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.942000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.942000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.942000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.942000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.942000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.942000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.942000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.942000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:27.942000 audit: BPF prog-id=89 op=LOAD Feb 12 22:24:27.942000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e3e38 items=0 ppid=2228 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:27.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739363730306264626137626133623238343465663838396531303732 Feb 12 22:24:28.721319 kubelet[2108]: E0212 22:24:28.721288 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:29.123055 kubelet[2108]: E0212 22:24:29.123007 2108 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:29.722342 kubelet[2108]: E0212 22:24:29.722293 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:30.075418 update_engine[1638]: I0212 22:24:30.075356 1638 update_attempter.cc:509] Updating boot flags... Feb 12 22:24:30.723328 kubelet[2108]: E0212 22:24:30.723289 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:31.123592 kubelet[2108]: E0212 22:24:31.122603 2108 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:31.211757 env[1647]: time="2024-02-12T22:24:31.211681888Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:24:31.215436 systemd[1]: cri-containerd-796700bdba7ba3b2844ef889e1072ae5c64859a65db879a52130928e05704114.scope: Deactivated successfully. Feb 12 22:24:31.218000 audit: BPF prog-id=89 op=UNLOAD Feb 12 22:24:31.242602 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-796700bdba7ba3b2844ef889e1072ae5c64859a65db879a52130928e05704114-rootfs.mount: Deactivated successfully. Feb 12 22:24:31.270317 kubelet[2108]: I0212 22:24:31.270284 2108 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 22:24:31.724119 kubelet[2108]: E0212 22:24:31.724046 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:32.725155 kubelet[2108]: E0212 22:24:32.725061 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:33.136822 systemd[1]: Created slice kubepods-besteffort-pode94dc6ea_cdbf_422e_a5e4_f121be40444c.slice. Feb 12 22:24:33.143857 env[1647]: time="2024-02-12T22:24:33.143784816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ghldj,Uid:e94dc6ea-cdbf-422e-a5e4-f121be40444c,Namespace:calico-system,Attempt:0,}" Feb 12 22:24:33.728675 kubelet[2108]: E0212 22:24:33.728484 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:33.770755 env[1647]: time="2024-02-12T22:24:33.770702550Z" level=info msg="shim disconnected" id=796700bdba7ba3b2844ef889e1072ae5c64859a65db879a52130928e05704114 Feb 12 22:24:33.770755 env[1647]: time="2024-02-12T22:24:33.770752686Z" level=warning msg="cleaning up after shim disconnected" id=796700bdba7ba3b2844ef889e1072ae5c64859a65db879a52130928e05704114 namespace=k8s.io Feb 12 22:24:33.770985 env[1647]: time="2024-02-12T22:24:33.770765193Z" level=info msg="cleaning up dead shim" Feb 12 22:24:33.805182 env[1647]: time="2024-02-12T22:24:33.805134851Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:24:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2827 runtime=io.containerd.runc.v2\n" Feb 12 22:24:33.806049 env[1647]: time="2024-02-12T22:24:33.805978487Z" level=error msg="Failed to destroy network for sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:24:33.809481 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765-shm.mount: Deactivated successfully. Feb 12 22:24:33.815344 env[1647]: time="2024-02-12T22:24:33.815009812Z" level=error msg="encountered an error cleaning up failed sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:24:33.815483 env[1647]: time="2024-02-12T22:24:33.815371038Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ghldj,Uid:e94dc6ea-cdbf-422e-a5e4-f121be40444c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:24:33.816652 kubelet[2108]: E0212 22:24:33.816614 2108 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:24:33.816772 kubelet[2108]: E0212 22:24:33.816696 2108 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ghldj" Feb 12 22:24:33.816772 kubelet[2108]: E0212 22:24:33.816728 2108 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ghldj" Feb 12 22:24:33.816867 kubelet[2108]: E0212 22:24:33.816800 2108 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ghldj_calico-system(e94dc6ea-cdbf-422e-a5e4-f121be40444c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ghldj_calico-system(e94dc6ea-cdbf-422e-a5e4-f121be40444c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:34.205071 kubelet[2108]: I0212 22:24:34.204663 2108 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:34.205247 env[1647]: time="2024-02-12T22:24:34.204722972Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 22:24:34.205612 env[1647]: time="2024-02-12T22:24:34.205244089Z" level=info msg="StopPodSandbox for \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\"" Feb 12 22:24:34.235437 env[1647]: time="2024-02-12T22:24:34.235326996Z" level=error msg="StopPodSandbox for \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\" failed" error="failed to destroy network for sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:24:34.235826 kubelet[2108]: E0212 22:24:34.235802 2108 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:34.236020 kubelet[2108]: E0212 22:24:34.235882 2108 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765} Feb 12 22:24:34.236020 kubelet[2108]: E0212 22:24:34.235931 2108 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e94dc6ea-cdbf-422e-a5e4-f121be40444c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:24:34.236020 kubelet[2108]: E0212 22:24:34.235969 2108 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e94dc6ea-cdbf-422e-a5e4-f121be40444c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ghldj" podUID=e94dc6ea-cdbf-422e-a5e4-f121be40444c Feb 12 22:24:34.729257 kubelet[2108]: E0212 22:24:34.729206 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:35.729880 kubelet[2108]: E0212 22:24:35.729817 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:36.478104 kubelet[2108]: I0212 22:24:36.478063 2108 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:24:36.484467 systemd[1]: Created slice kubepods-besteffort-podf9de275d_94dd_4478_a473_a447bec507f6.slice. Feb 12 22:24:36.585898 kubelet[2108]: I0212 22:24:36.585850 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-68xcs\" (UniqueName: \"kubernetes.io/projected/f9de275d-94dd-4478-a473-a447bec507f6-kube-api-access-68xcs\") pod \"nginx-deployment-8ffc5cf85-74mh9\" (UID: \"f9de275d-94dd-4478-a473-a447bec507f6\") " pod="default/nginx-deployment-8ffc5cf85-74mh9" Feb 12 22:24:36.730579 kubelet[2108]: E0212 22:24:36.730399 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:36.789663 env[1647]: time="2024-02-12T22:24:36.789608121Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-74mh9,Uid:f9de275d-94dd-4478-a473-a447bec507f6,Namespace:default,Attempt:0,}" Feb 12 22:24:37.731496 kubelet[2108]: E0212 22:24:37.731374 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:38.698217 kubelet[2108]: E0212 22:24:38.698160 2108 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:38.732626 kubelet[2108]: E0212 22:24:38.732561 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:39.004532 env[1647]: time="2024-02-12T22:24:39.004233621Z" level=error msg="Failed to destroy network for sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:24:39.010527 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41-shm.mount: Deactivated successfully. Feb 12 22:24:39.011823 env[1647]: time="2024-02-12T22:24:39.011758202Z" level=error msg="encountered an error cleaning up failed sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:24:39.011951 env[1647]: time="2024-02-12T22:24:39.011851208Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-74mh9,Uid:f9de275d-94dd-4478-a473-a447bec507f6,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:24:39.012235 kubelet[2108]: E0212 22:24:39.012212 2108 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:24:39.012329 kubelet[2108]: E0212 22:24:39.012296 2108 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-74mh9" Feb 12 22:24:39.012425 kubelet[2108]: E0212 22:24:39.012331 2108 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-74mh9" Feb 12 22:24:39.012486 kubelet[2108]: E0212 22:24:39.012476 2108 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-74mh9_default(f9de275d-94dd-4478-a473-a447bec507f6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-74mh9_default(f9de275d-94dd-4478-a473-a447bec507f6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-74mh9" podUID=f9de275d-94dd-4478-a473-a447bec507f6 Feb 12 22:24:39.216722 kubelet[2108]: I0212 22:24:39.216691 2108 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:39.218001 env[1647]: time="2024-02-12T22:24:39.217952799Z" level=info msg="StopPodSandbox for \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\"" Feb 12 22:24:39.292252 env[1647]: time="2024-02-12T22:24:39.292140195Z" level=error msg="StopPodSandbox for \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\" failed" error="failed to destroy network for sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:24:39.292553 kubelet[2108]: E0212 22:24:39.292530 2108 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:39.292832 kubelet[2108]: E0212 22:24:39.292578 2108 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41} Feb 12 22:24:39.292832 kubelet[2108]: E0212 22:24:39.292749 2108 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f9de275d-94dd-4478-a473-a447bec507f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:24:39.293267 kubelet[2108]: E0212 22:24:39.292836 2108 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f9de275d-94dd-4478-a473-a447bec507f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-74mh9" podUID=f9de275d-94dd-4478-a473-a447bec507f6 Feb 12 22:24:39.735480 kubelet[2108]: E0212 22:24:39.733951 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:40.734643 kubelet[2108]: E0212 22:24:40.734605 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:41.734936 kubelet[2108]: E0212 22:24:41.734802 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:42.736059 kubelet[2108]: E0212 22:24:42.735962 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:43.736905 kubelet[2108]: E0212 22:24:43.736784 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:43.774186 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount832614658.mount: Deactivated successfully. Feb 12 22:24:44.026064 env[1647]: time="2024-02-12T22:24:44.025923552Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:44.028841 env[1647]: time="2024-02-12T22:24:44.028794503Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:44.031274 env[1647]: time="2024-02-12T22:24:44.031236428Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:44.033128 env[1647]: time="2024-02-12T22:24:44.033091285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:44.033680 env[1647]: time="2024-02-12T22:24:44.033643807Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 22:24:44.051568 env[1647]: time="2024-02-12T22:24:44.050092761Z" level=info msg="CreateContainer within sandbox \"b202f25d95020fa77d631831a8b43d0aa53c7e74e85912e47b274a3c69b9be88\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 22:24:44.073808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount390756113.mount: Deactivated successfully. Feb 12 22:24:44.082043 env[1647]: time="2024-02-12T22:24:44.081973503Z" level=info msg="CreateContainer within sandbox \"b202f25d95020fa77d631831a8b43d0aa53c7e74e85912e47b274a3c69b9be88\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a941731937d31cda0ed7da1693f7e6b93a32e38a71fb17b6222c79b14d8654db\"" Feb 12 22:24:44.082801 env[1647]: time="2024-02-12T22:24:44.082765805Z" level=info msg="StartContainer for \"a941731937d31cda0ed7da1693f7e6b93a32e38a71fb17b6222c79b14d8654db\"" Feb 12 22:24:44.116253 systemd[1]: Started cri-containerd-a941731937d31cda0ed7da1693f7e6b93a32e38a71fb17b6222c79b14d8654db.scope. Feb 12 22:24:44.173283 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 22:24:44.173439 kernel: audit: type=1400 audit(1707776684.159:748): avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.173483 kernel: audit: type=1300 audit(1707776684.159:748): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fee2c06e838 items=0 ppid=2228 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fee2c06e838 items=0 ppid=2228 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:44.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139343137333139333764333163646130656437646131363933663765 Feb 12 22:24:44.181270 kernel: audit: type=1327 audit(1707776684.159:748): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139343137333139333764333163646130656437646131363933663765 Feb 12 22:24:44.181373 kernel: audit: type=1400 audit(1707776684.159:749): avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.193041 kernel: audit: type=1400 audit(1707776684.159:749): avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.208095 kernel: audit: type=1400 audit(1707776684.159:749): avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.208203 kernel: audit: type=1400 audit(1707776684.159:749): avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.208251 kernel: audit: type=1400 audit(1707776684.159:749): avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.212914 env[1647]: time="2024-02-12T22:24:44.212868568Z" level=info msg="StartContainer for \"a941731937d31cda0ed7da1693f7e6b93a32e38a71fb17b6222c79b14d8654db\" returns successfully" Feb 12 22:24:44.218533 kernel: audit: type=1400 audit(1707776684.159:749): avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.218641 kernel: audit: type=1400 audit(1707776684.159:749): avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.159000 audit: BPF prog-id=90 op=LOAD Feb 12 22:24:44.159000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002877f8 items=0 ppid=2228 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:44.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139343137333139333764333163646130656437646131363933663765 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit: BPF prog-id=91 op=LOAD Feb 12 22:24:44.172000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000287848 items=0 ppid=2228 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139343137333139333764333163646130656437646131363933663765 Feb 12 22:24:44.172000 audit: BPF prog-id=91 op=UNLOAD Feb 12 22:24:44.172000 audit: BPF prog-id=90 op=UNLOAD Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:44.172000 audit: BPF prog-id=92 op=LOAD Feb 12 22:24:44.172000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002878d8 items=0 ppid=2228 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139343137333139333764333163646130656437646131363933663765 Feb 12 22:24:44.472669 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 22:24:44.472826 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 22:24:44.478405 amazon-ssm-agent[1623]: 2024-02-12 22:24:44 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 12 22:24:44.738085 kubelet[2108]: E0212 22:24:44.737895 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:45.738156 kubelet[2108]: E0212 22:24:45.738106 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:45.833000 audit[3070]: AVC avc: denied { write } for pid=3070 comm="tee" name="fd" dev="proc" ino=20013 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:24:45.835000 audit[3073]: AVC avc: denied { write } for pid=3073 comm="tee" name="fd" dev="proc" ino=20968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:24:45.835000 audit[3073]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff9dd5987 a2=241 a3=1b6 items=1 ppid=3045 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:45.835000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 22:24:45.835000 audit: PATH item=0 name="/dev/fd/63" inode=20958 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:24:45.835000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:24:45.838000 audit[3083]: AVC avc: denied { write } for pid=3083 comm="tee" name="fd" dev="proc" ino=20972 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:24:45.833000 audit[3070]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3aaed977 a2=241 a3=1b6 items=1 ppid=3051 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:45.833000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 22:24:45.833000 audit: PATH item=0 name="/dev/fd/63" inode=19998 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:24:45.833000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:24:45.844000 audit[3084]: AVC avc: denied { write } for pid=3084 comm="tee" name="fd" dev="proc" ino=20020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:24:45.846000 audit[3075]: AVC avc: denied { write } for pid=3075 comm="tee" name="fd" dev="proc" ino=20981 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:24:45.846000 audit[3075]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe793d986 a2=241 a3=1b6 items=1 ppid=3040 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:45.846000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 22:24:45.846000 audit: PATH item=0 name="/dev/fd/63" inode=20959 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:24:45.846000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:24:45.851000 audit[3101]: AVC avc: denied { write } for pid=3101 comm="tee" name="fd" dev="proc" ino=20988 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:24:45.851000 audit[3101]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdfb5dd986 a2=241 a3=1b6 items=1 ppid=3042 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:45.851000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 22:24:45.851000 audit: PATH item=0 name="/dev/fd/63" inode=20965 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:24:45.851000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:24:45.844000 audit[3084]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6c8e6976 a2=241 a3=1b6 items=1 ppid=3047 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:45.844000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 22:24:45.838000 audit[3083]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe172e1986 a2=241 a3=1b6 items=1 ppid=3039 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:45.838000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 22:24:45.838000 audit: PATH item=0 name="/dev/fd/63" inode=20962 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:24:45.838000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:24:45.844000 audit: PATH item=0 name="/dev/fd/63" inode=20005 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:24:45.844000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:24:45.855000 audit[3109]: AVC avc: denied { write } for pid=3109 comm="tee" name="fd" dev="proc" ino=20025 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:24:45.855000 audit[3109]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3e252988 a2=241 a3=1b6 items=1 ppid=3049 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:45.855000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 22:24:45.855000 audit: PATH item=0 name="/dev/fd/63" inode=20021 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:24:45.855000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:24:46.124371 env[1647]: time="2024-02-12T22:24:46.124320676Z" level=info msg="StopPodSandbox for \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\"" Feb 12 22:24:46.197049 kernel: Initializing XFRM netlink socket Feb 12 22:24:46.230684 kubelet[2108]: I0212 22:24:46.230274 2108 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-d6jvm" podStartSLOduration=-9.223372001624557e+09 pod.CreationTimestamp="2024-02-12 22:24:11 +0000 UTC" firstStartedPulling="2024-02-12 22:24:15.512231145 +0000 UTC m=+17.340777269" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:24:44.245971865 +0000 UTC m=+46.074518001" watchObservedRunningTime="2024-02-12 22:24:46.230219223 +0000 UTC m=+48.058765351" Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.230 [INFO][3145] k8s.go 578: Cleaning up netns ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.230 [INFO][3145] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" iface="eth0" netns="/var/run/netns/cni-066d507c-c85a-53ca-0d2d-590306ee7ca4" Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.231 [INFO][3145] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" iface="eth0" netns="/var/run/netns/cni-066d507c-c85a-53ca-0d2d-590306ee7ca4" Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.233 [INFO][3145] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" iface="eth0" netns="/var/run/netns/cni-066d507c-c85a-53ca-0d2d-590306ee7ca4" Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.233 [INFO][3145] k8s.go 585: Releasing IP address(es) ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.233 [INFO][3145] utils.go 188: Calico CNI releasing IP address ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.371 [INFO][3179] ipam_plugin.go 415: Releasing address using handleID ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" HandleID="k8s-pod-network.da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.372 [INFO][3179] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.372 [INFO][3179] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.385 [WARNING][3179] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" HandleID="k8s-pod-network.da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.385 [INFO][3179] ipam_plugin.go 443: Releasing address using workloadID ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" HandleID="k8s-pod-network.da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.387 [INFO][3179] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:46.393483 env[1647]: 2024-02-12 22:24:46.390 [INFO][3145] k8s.go 591: Teardown processing complete. ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:46.406429 env[1647]: time="2024-02-12T22:24:46.393827646Z" level=info msg="TearDown network for sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\" successfully" Feb 12 22:24:46.406429 env[1647]: time="2024-02-12T22:24:46.393901898Z" level=info msg="StopPodSandbox for \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\" returns successfully" Feb 12 22:24:46.408192 env[1647]: time="2024-02-12T22:24:46.406598817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ghldj,Uid:e94dc6ea-cdbf-422e-a5e4-f121be40444c,Namespace:calico-system,Attempt:1,}" Feb 12 22:24:46.407872 systemd[1]: run-netns-cni\x2d066d507c\x2dc85a\x2d53ca\x2d0d2d\x2d590306ee7ca4.mount: Deactivated successfully. Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit: BPF prog-id=93 op=LOAD Feb 12 22:24:46.556000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcced75210 a2=70 a3=7ff6f4b42000 items=0 ppid=3043 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.556000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:24:46.556000 audit: BPF prog-id=93 op=UNLOAD Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit: BPF prog-id=94 op=LOAD Feb 12 22:24:46.556000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcced75210 a2=70 a3=6e items=0 ppid=3043 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.556000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:24:46.556000 audit: BPF prog-id=94 op=UNLOAD Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcced751c0 a2=70 a3=7ffcced75210 items=0 ppid=3043 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.556000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit: BPF prog-id=95 op=LOAD Feb 12 22:24:46.556000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcced751a0 a2=70 a3=7ffcced75210 items=0 ppid=3043 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.556000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:24:46.556000 audit: BPF prog-id=95 op=UNLOAD Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcced75280 a2=70 a3=0 items=0 ppid=3043 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.556000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcced75270 a2=70 a3=0 items=0 ppid=3043 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.556000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:24:46.556000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.556000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffcced752b0 a2=70 a3=0 items=0 ppid=3043 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.556000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:24:46.557000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.557000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.557000 audit[3212]: AVC avc: denied { bpf } for pid=3212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.557000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.557000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.557000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.557000 audit[3212]: AVC avc: denied { perfmon } for pid=3212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.557000 audit[3212]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcced751d0 a2=70 a3=ffffffff items=0 ppid=3043 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.557000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:24:46.563000 audit[3214]: AVC avc: denied { bpf } for pid=3214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.563000 audit[3214]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe9cf8edb0 a2=70 a3=fff80800 items=0 ppid=3043 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.563000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:24:46.563000 audit[3214]: AVC avc: denied { bpf } for pid=3214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.563000 audit[3214]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe9cf8ec80 a2=70 a3=3 items=0 ppid=3043 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.563000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:24:46.576564 (udev-worker)[3216]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:24:46.578000 audit: BPF prog-id=96 op=UNLOAD Feb 12 22:24:46.706000 audit[3248]: NETFILTER_CFG table=mangle:79 family=2 entries=19 op=nft_register_chain pid=3248 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:24:46.706000 audit[3248]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd30d47800 a2=0 a3=7ffd30d477ec items=0 ppid=3043 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.706000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:24:46.714000 audit[3247]: NETFILTER_CFG table=raw:80 family=2 entries=19 op=nft_register_chain pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:24:46.714000 audit[3247]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd20d4dc40 a2=0 a3=561c1910b000 items=0 ppid=3043 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.714000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:24:46.726000 audit[3251]: NETFILTER_CFG table=nat:81 family=2 entries=16 op=nft_register_chain pid=3251 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:24:46.726000 audit[3251]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fffc35b25e0 a2=0 a3=5636dfd3a000 items=0 ppid=3043 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.726000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:24:46.732000 audit[3250]: NETFILTER_CFG table=filter:82 family=2 entries=39 op=nft_register_chain pid=3250 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:24:46.732000 audit[3250]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffef0985c10 a2=0 a3=563a3552e000 items=0 ppid=3043 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.732000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:24:46.746659 kubelet[2108]: E0212 22:24:46.740612 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:46.815740 (udev-worker)[3233]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:24:46.816825 systemd-networkd[1459]: cali257cf29a966: Link UP Feb 12 22:24:46.820052 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali257cf29a966: link becomes ready Feb 12 22:24:46.820122 systemd-networkd[1459]: cali257cf29a966: Gained carrier Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.606 [INFO][3203] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.23.13-k8s-csi--node--driver--ghldj-eth0 csi-node-driver- calico-system e94dc6ea-cdbf-422e-a5e4-f121be40444c 973 0 2024-02-12 22:24:11 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.23.13 csi-node-driver-ghldj eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali257cf29a966 [] []}} ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Namespace="calico-system" Pod="csi-node-driver-ghldj" WorkloadEndpoint="172.31.23.13-k8s-csi--node--driver--ghldj-" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.607 [INFO][3203] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Namespace="calico-system" Pod="csi-node-driver-ghldj" WorkloadEndpoint="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.757 [INFO][3235] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" HandleID="k8s-pod-network.cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.775 [INFO][3235] ipam_plugin.go 268: Auto assigning IP ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" HandleID="k8s-pod-network.cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027daa0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.23.13", "pod":"csi-node-driver-ghldj", "timestamp":"2024-02-12 22:24:46.757469812 +0000 UTC"}, Hostname:"172.31.23.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.775 [INFO][3235] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.775 [INFO][3235] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.775 [INFO][3235] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.23.13' Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.778 [INFO][3235] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" host="172.31.23.13" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.786 [INFO][3235] ipam.go 372: Looking up existing affinities for host host="172.31.23.13" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.792 [INFO][3235] ipam.go 489: Trying affinity for 192.168.19.192/26 host="172.31.23.13" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.794 [INFO][3235] ipam.go 155: Attempting to load block cidr=192.168.19.192/26 host="172.31.23.13" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.797 [INFO][3235] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.192/26 host="172.31.23.13" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.797 [INFO][3235] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.192/26 handle="k8s-pod-network.cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" host="172.31.23.13" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.800 [INFO][3235] ipam.go 1682: Creating new handle: k8s-pod-network.cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.804 [INFO][3235] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.192/26 handle="k8s-pod-network.cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" host="172.31.23.13" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.810 [INFO][3235] ipam.go 1216: Successfully claimed IPs: [192.168.19.193/26] block=192.168.19.192/26 handle="k8s-pod-network.cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" host="172.31.23.13" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.810 [INFO][3235] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.193/26] handle="k8s-pod-network.cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" host="172.31.23.13" Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.810 [INFO][3235] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:46.838210 env[1647]: 2024-02-12 22:24:46.810 [INFO][3235] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.193/26] IPv6=[] ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" HandleID="k8s-pod-network.cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:46.839524 env[1647]: 2024-02-12 22:24:46.812 [INFO][3203] k8s.go 385: Populated endpoint ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Namespace="calico-system" Pod="csi-node-driver-ghldj" WorkloadEndpoint="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-csi--node--driver--ghldj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e94dc6ea-cdbf-422e-a5e4-f121be40444c", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"", Pod:"csi-node-driver-ghldj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali257cf29a966", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:46.839524 env[1647]: 2024-02-12 22:24:46.813 [INFO][3203] k8s.go 386: Calico CNI using IPs: [192.168.19.193/32] ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Namespace="calico-system" Pod="csi-node-driver-ghldj" WorkloadEndpoint="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:46.839524 env[1647]: 2024-02-12 22:24:46.813 [INFO][3203] dataplane_linux.go 68: Setting the host side veth name to cali257cf29a966 ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Namespace="calico-system" Pod="csi-node-driver-ghldj" WorkloadEndpoint="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:46.839524 env[1647]: 2024-02-12 22:24:46.820 [INFO][3203] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Namespace="calico-system" Pod="csi-node-driver-ghldj" WorkloadEndpoint="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:46.839524 env[1647]: 2024-02-12 22:24:46.821 [INFO][3203] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Namespace="calico-system" Pod="csi-node-driver-ghldj" WorkloadEndpoint="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-csi--node--driver--ghldj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e94dc6ea-cdbf-422e-a5e4-f121be40444c", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f", Pod:"csi-node-driver-ghldj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali257cf29a966", MAC:"ea:60:33:c2:88:eb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:46.839524 env[1647]: 2024-02-12 22:24:46.835 [INFO][3203] k8s.go 491: Wrote updated endpoint to datastore ContainerID="cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f" Namespace="calico-system" Pod="csi-node-driver-ghldj" WorkloadEndpoint="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:46.889374 env[1647]: time="2024-02-12T22:24:46.889265300Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:24:46.889836 env[1647]: time="2024-02-12T22:24:46.889787402Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:24:46.890128 env[1647]: time="2024-02-12T22:24:46.890096644Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:24:46.890550 env[1647]: time="2024-02-12T22:24:46.890457086Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f pid=3282 runtime=io.containerd.runc.v2 Feb 12 22:24:46.906000 audit[3294]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_chain pid=3294 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:24:46.906000 audit[3294]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff34ea62f0 a2=0 a3=7fff34ea62dc items=0 ppid=3043 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.906000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:24:46.930720 systemd[1]: Started cri-containerd-cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f.scope. Feb 12 22:24:46.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.942000 audit: BPF prog-id=97 op=LOAD Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3282 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362393432643965386333616664663631613061366230366466656233 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3282 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362393432643965386333616664663631613061366230366466656233 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit: BPF prog-id=98 op=LOAD Feb 12 22:24:46.943000 audit[3293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185840 items=0 ppid=3282 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362393432643965386333616664663631613061366230366466656233 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit: BPF prog-id=99 op=LOAD Feb 12 22:24:46.943000 audit[3293]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185888 items=0 ppid=3282 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362393432643965386333616664663631613061366230366466656233 Feb 12 22:24:46.943000 audit: BPF prog-id=99 op=UNLOAD Feb 12 22:24:46.943000 audit: BPF prog-id=98 op=UNLOAD Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { perfmon } for pid=3293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit[3293]: AVC avc: denied { bpf } for pid=3293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:46.943000 audit: BPF prog-id=100 op=LOAD Feb 12 22:24:46.943000 audit[3293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185c98 items=0 ppid=3282 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:46.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362393432643965386333616664663631613061366230366466656233 Feb 12 22:24:46.958541 env[1647]: time="2024-02-12T22:24:46.958500555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ghldj,Uid:e94dc6ea-cdbf-422e-a5e4-f121be40444c,Namespace:calico-system,Attempt:1,} returns sandbox id \"cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f\"" Feb 12 22:24:46.960465 env[1647]: time="2024-02-12T22:24:46.960309766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 22:24:47.290004 (udev-worker)[2983]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:24:47.293597 systemd-networkd[1459]: vxlan.calico: Link UP Feb 12 22:24:47.293602 systemd-networkd[1459]: vxlan.calico: Gained carrier Feb 12 22:24:47.399440 systemd[1]: run-containerd-runc-k8s.io-cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f-runc.kaFPEI.mount: Deactivated successfully. Feb 12 22:24:47.741832 kubelet[2108]: E0212 22:24:47.741700 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:48.543164 systemd-networkd[1459]: cali257cf29a966: Gained IPv6LL Feb 12 22:24:48.742622 kubelet[2108]: E0212 22:24:48.742171 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:48.788951 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2090507816.mount: Deactivated successfully. Feb 12 22:24:49.245436 systemd-networkd[1459]: vxlan.calico: Gained IPv6LL Feb 12 22:24:49.436308 env[1647]: time="2024-02-12T22:24:49.436259855Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:49.439744 env[1647]: time="2024-02-12T22:24:49.439696766Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:49.442131 env[1647]: time="2024-02-12T22:24:49.442091093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:49.444527 env[1647]: time="2024-02-12T22:24:49.444491806Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:49.445056 env[1647]: time="2024-02-12T22:24:49.444999455Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 22:24:49.447337 env[1647]: time="2024-02-12T22:24:49.447303350Z" level=info msg="CreateContainer within sandbox \"cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 22:24:49.464083 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3563732732.mount: Deactivated successfully. Feb 12 22:24:49.471666 env[1647]: time="2024-02-12T22:24:49.471618202Z" level=info msg="CreateContainer within sandbox \"cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d1fe9fb46a72e6c5dd260268ab883aa410ee7aa276e980595c602b6c9c282cd8\"" Feb 12 22:24:49.472616 env[1647]: time="2024-02-12T22:24:49.472532224Z" level=info msg="StartContainer for \"d1fe9fb46a72e6c5dd260268ab883aa410ee7aa276e980595c602b6c9c282cd8\"" Feb 12 22:24:49.498114 systemd[1]: Started cri-containerd-d1fe9fb46a72e6c5dd260268ab883aa410ee7aa276e980595c602b6c9c282cd8.scope. Feb 12 22:24:49.528609 kernel: kauditd_printk_skb: 219 callbacks suppressed Feb 12 22:24:49.528753 kernel: audit: type=1400 audit(1707776689.521:798): avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f9e4822ab18 items=0 ppid=3282 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:49.537066 kernel: audit: type=1300 audit(1707776689.521:798): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f9e4822ab18 items=0 ppid=3282 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:49.537185 kernel: audit: type=1327 audit(1707776689.521:798): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666539666234366137326536633564643236303236386162383833 Feb 12 22:24:49.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666539666234366137326536633564643236303236386162383833 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.549388 kernel: audit: type=1400 audit(1707776689.521:799): avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.555136 kernel: audit: type=1400 audit(1707776689.521:799): avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.560272 kernel: audit: type=1400 audit(1707776689.521:799): avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.579087 kernel: audit: type=1400 audit(1707776689.521:799): avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.579292 kernel: audit: type=1400 audit(1707776689.521:799): avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.586756 kernel: audit: type=1400 audit(1707776689.521:799): avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.591619 kernel: audit: type=1400 audit(1707776689.521:799): avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.521000 audit: BPF prog-id=101 op=LOAD Feb 12 22:24:49.521000 audit[3330]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001e6568 items=0 ppid=3282 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:49.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666539666234366137326536633564643236303236386162383833 Feb 12 22:24:49.523000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.523000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.523000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.523000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.523000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.523000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.523000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.523000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.523000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.523000 audit: BPF prog-id=102 op=LOAD Feb 12 22:24:49.523000 audit[3330]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001e65b8 items=0 ppid=3282 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:49.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666539666234366137326536633564643236303236386162383833 Feb 12 22:24:49.528000 audit: BPF prog-id=102 op=UNLOAD Feb 12 22:24:49.528000 audit: BPF prog-id=101 op=UNLOAD Feb 12 22:24:49.528000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.528000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.528000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.528000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.528000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.528000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.528000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.528000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.528000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.528000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:49.528000 audit: BPF prog-id=103 op=LOAD Feb 12 22:24:49.528000 audit[3330]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001e6648 items=0 ppid=3282 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:49.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431666539666234366137326536633564643236303236386162383833 Feb 12 22:24:49.605472 env[1647]: time="2024-02-12T22:24:49.605397762Z" level=info msg="StartContainer for \"d1fe9fb46a72e6c5dd260268ab883aa410ee7aa276e980595c602b6c9c282cd8\" returns successfully" Feb 12 22:24:49.608053 env[1647]: time="2024-02-12T22:24:49.607886552Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 22:24:49.742764 kubelet[2108]: E0212 22:24:49.742726 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:50.742903 kubelet[2108]: E0212 22:24:50.742831 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:51.743974 kubelet[2108]: E0212 22:24:51.743870 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:51.797014 env[1647]: time="2024-02-12T22:24:51.796962933Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:51.800421 env[1647]: time="2024-02-12T22:24:51.800373258Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:51.804204 env[1647]: time="2024-02-12T22:24:51.804156304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:51.806583 env[1647]: time="2024-02-12T22:24:51.806437628Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:51.807759 env[1647]: time="2024-02-12T22:24:51.807667076Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 22:24:51.812599 env[1647]: time="2024-02-12T22:24:51.812561541Z" level=info msg="CreateContainer within sandbox \"cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 22:24:51.837703 env[1647]: time="2024-02-12T22:24:51.837648148Z" level=info msg="CreateContainer within sandbox \"cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"610cf2fa69afdecb2d1b14241330fbdc16e829bc4c19110c2a1600e651334f80\"" Feb 12 22:24:51.838654 env[1647]: time="2024-02-12T22:24:51.838617244Z" level=info msg="StartContainer for \"610cf2fa69afdecb2d1b14241330fbdc16e829bc4c19110c2a1600e651334f80\"" Feb 12 22:24:51.879869 systemd[1]: run-containerd-runc-k8s.io-610cf2fa69afdecb2d1b14241330fbdc16e829bc4c19110c2a1600e651334f80-runc.Pdusm6.mount: Deactivated successfully. Feb 12 22:24:51.882177 systemd[1]: Started cri-containerd-610cf2fa69afdecb2d1b14241330fbdc16e829bc4c19110c2a1600e651334f80.scope. Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fef01a794f8 items=0 ppid=3282 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:51.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631306366326661363961666465636232643162313432343133333066 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit: BPF prog-id=104 op=LOAD Feb 12 22:24:51.906000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000339ed8 items=0 ppid=3282 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:51.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631306366326661363961666465636232643162313432343133333066 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit: BPF prog-id=105 op=LOAD Feb 12 22:24:51.906000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000339f28 items=0 ppid=3282 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:51.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631306366326661363961666465636232643162313432343133333066 Feb 12 22:24:51.906000 audit: BPF prog-id=105 op=UNLOAD Feb 12 22:24:51.906000 audit: BPF prog-id=104 op=UNLOAD Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:51.906000 audit: BPF prog-id=106 op=LOAD Feb 12 22:24:51.906000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000339fb8 items=0 ppid=3282 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:51.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631306366326661363961666465636232643162313432343133333066 Feb 12 22:24:52.032418 env[1647]: time="2024-02-12T22:24:52.032256819Z" level=info msg="StartContainer for \"610cf2fa69afdecb2d1b14241330fbdc16e829bc4c19110c2a1600e651334f80\" returns successfully" Feb 12 22:24:52.122832 env[1647]: time="2024-02-12T22:24:52.122786282Z" level=info msg="StopPodSandbox for \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\"" Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.168 [INFO][3413] k8s.go 578: Cleaning up netns ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.169 [INFO][3413] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" iface="eth0" netns="/var/run/netns/cni-c6a81b71-68b4-7950-edd9-705fa0e2044d" Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.169 [INFO][3413] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" iface="eth0" netns="/var/run/netns/cni-c6a81b71-68b4-7950-edd9-705fa0e2044d" Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.169 [INFO][3413] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" iface="eth0" netns="/var/run/netns/cni-c6a81b71-68b4-7950-edd9-705fa0e2044d" Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.169 [INFO][3413] k8s.go 585: Releasing IP address(es) ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.169 [INFO][3413] utils.go 188: Calico CNI releasing IP address ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.194 [INFO][3419] ipam_plugin.go 415: Releasing address using handleID ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" HandleID="k8s-pod-network.672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.194 [INFO][3419] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.194 [INFO][3419] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.202 [WARNING][3419] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" HandleID="k8s-pod-network.672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.202 [INFO][3419] ipam_plugin.go 443: Releasing address using workloadID ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" HandleID="k8s-pod-network.672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.204 [INFO][3419] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:52.207113 env[1647]: 2024-02-12 22:24:52.205 [INFO][3413] k8s.go 591: Teardown processing complete. ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:52.208151 env[1647]: time="2024-02-12T22:24:52.207504684Z" level=info msg="TearDown network for sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\" successfully" Feb 12 22:24:52.208151 env[1647]: time="2024-02-12T22:24:52.207588703Z" level=info msg="StopPodSandbox for \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\" returns successfully" Feb 12 22:24:52.208555 env[1647]: time="2024-02-12T22:24:52.208483233Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-74mh9,Uid:f9de275d-94dd-4478-a473-a447bec507f6,Namespace:default,Attempt:1,}" Feb 12 22:24:52.383837 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:24:52.384079 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif3b04ce2cf2: link becomes ready Feb 12 22:24:52.381312 systemd-networkd[1459]: calif3b04ce2cf2: Link UP Feb 12 22:24:52.383986 systemd-networkd[1459]: calif3b04ce2cf2: Gained carrier Feb 12 22:24:52.386659 (udev-worker)[3446]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:24:52.392718 kubelet[2108]: I0212 22:24:52.392671 2108 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-ghldj" podStartSLOduration=-9.223371995462173e+09 pod.CreationTimestamp="2024-02-12 22:24:11 +0000 UTC" firstStartedPulling="2024-02-12 22:24:46.959784148 +0000 UTC m=+48.788330274" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:24:52.267837343 +0000 UTC m=+54.096383476" watchObservedRunningTime="2024-02-12 22:24:52.392601917 +0000 UTC m=+54.221148042" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.266 [INFO][3427] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0 nginx-deployment-8ffc5cf85- default f9de275d-94dd-4478-a473-a447bec507f6 997 0 2024-02-12 22:24:36 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.23.13 nginx-deployment-8ffc5cf85-74mh9 eth0 default [] [] [kns.default ksa.default.default] calif3b04ce2cf2 [] []}} ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Namespace="default" Pod="nginx-deployment-8ffc5cf85-74mh9" WorkloadEndpoint="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.268 [INFO][3427] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Namespace="default" Pod="nginx-deployment-8ffc5cf85-74mh9" WorkloadEndpoint="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.317 [INFO][3439] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" HandleID="k8s-pod-network.375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.338 [INFO][3439] ipam_plugin.go 268: Auto assigning IP ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" HandleID="k8s-pod-network.375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027c840), Attrs:map[string]string{"namespace":"default", "node":"172.31.23.13", "pod":"nginx-deployment-8ffc5cf85-74mh9", "timestamp":"2024-02-12 22:24:52.317894918 +0000 UTC"}, Hostname:"172.31.23.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.338 [INFO][3439] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.339 [INFO][3439] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.339 [INFO][3439] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.23.13' Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.344 [INFO][3439] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" host="172.31.23.13" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.352 [INFO][3439] ipam.go 372: Looking up existing affinities for host host="172.31.23.13" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.357 [INFO][3439] ipam.go 489: Trying affinity for 192.168.19.192/26 host="172.31.23.13" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.359 [INFO][3439] ipam.go 155: Attempting to load block cidr=192.168.19.192/26 host="172.31.23.13" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.362 [INFO][3439] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.192/26 host="172.31.23.13" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.362 [INFO][3439] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.192/26 handle="k8s-pod-network.375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" host="172.31.23.13" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.364 [INFO][3439] ipam.go 1682: Creating new handle: k8s-pod-network.375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59 Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.368 [INFO][3439] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.192/26 handle="k8s-pod-network.375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" host="172.31.23.13" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.373 [INFO][3439] ipam.go 1216: Successfully claimed IPs: [192.168.19.194/26] block=192.168.19.192/26 handle="k8s-pod-network.375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" host="172.31.23.13" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.373 [INFO][3439] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.194/26] handle="k8s-pod-network.375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" host="172.31.23.13" Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.374 [INFO][3439] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:52.402807 env[1647]: 2024-02-12 22:24:52.374 [INFO][3439] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.194/26] IPv6=[] ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" HandleID="k8s-pod-network.375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:52.404120 env[1647]: 2024-02-12 22:24:52.378 [INFO][3427] k8s.go 385: Populated endpoint ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Namespace="default" Pod="nginx-deployment-8ffc5cf85-74mh9" WorkloadEndpoint="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"f9de275d-94dd-4478-a473-a447bec507f6", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-74mh9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif3b04ce2cf2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:52.404120 env[1647]: 2024-02-12 22:24:52.378 [INFO][3427] k8s.go 386: Calico CNI using IPs: [192.168.19.194/32] ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Namespace="default" Pod="nginx-deployment-8ffc5cf85-74mh9" WorkloadEndpoint="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:52.404120 env[1647]: 2024-02-12 22:24:52.378 [INFO][3427] dataplane_linux.go 68: Setting the host side veth name to calif3b04ce2cf2 ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Namespace="default" Pod="nginx-deployment-8ffc5cf85-74mh9" WorkloadEndpoint="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:52.404120 env[1647]: 2024-02-12 22:24:52.384 [INFO][3427] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Namespace="default" Pod="nginx-deployment-8ffc5cf85-74mh9" WorkloadEndpoint="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:52.404120 env[1647]: 2024-02-12 22:24:52.385 [INFO][3427] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Namespace="default" Pod="nginx-deployment-8ffc5cf85-74mh9" WorkloadEndpoint="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"f9de275d-94dd-4478-a473-a447bec507f6", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59", Pod:"nginx-deployment-8ffc5cf85-74mh9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif3b04ce2cf2", MAC:"a2:bc:8d:5b:4b:4c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:52.404120 env[1647]: 2024-02-12 22:24:52.393 [INFO][3427] k8s.go 491: Wrote updated endpoint to datastore ContainerID="375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59" Namespace="default" Pod="nginx-deployment-8ffc5cf85-74mh9" WorkloadEndpoint="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:52.420000 audit[3462]: NETFILTER_CFG table=filter:84 family=2 entries=40 op=nft_register_chain pid=3462 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:24:52.420000 audit[3462]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7fff81220840 a2=0 a3=7fff8122082c items=0 ppid=3043 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:52.420000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:24:52.493710 env[1647]: time="2024-02-12T22:24:52.493190646Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:24:52.493710 env[1647]: time="2024-02-12T22:24:52.493291785Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:24:52.493710 env[1647]: time="2024-02-12T22:24:52.493496754Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:24:52.493986 env[1647]: time="2024-02-12T22:24:52.493792059Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59 pid=3471 runtime=io.containerd.runc.v2 Feb 12 22:24:52.511940 systemd[1]: Started cri-containerd-375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59.scope. Feb 12 22:24:52.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit: BPF prog-id=107 op=LOAD Feb 12 22:24:52.530000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3471 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:52.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337356566353933623739376266656434363734343263623361326135 Feb 12 22:24:52.530000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.530000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3471 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:52.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337356566353933623739376266656434363734343263623361326135 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit: BPF prog-id=108 op=LOAD Feb 12 22:24:52.531000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308520 items=0 ppid=3471 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:52.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337356566353933623739376266656434363734343263623361326135 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit: BPF prog-id=109 op=LOAD Feb 12 22:24:52.531000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308568 items=0 ppid=3471 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:52.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337356566353933623739376266656434363734343263623361326135 Feb 12 22:24:52.531000 audit: BPF prog-id=109 op=UNLOAD Feb 12 22:24:52.531000 audit: BPF prog-id=108 op=UNLOAD Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:52.531000 audit: BPF prog-id=110 op=LOAD Feb 12 22:24:52.531000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308978 items=0 ppid=3471 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:52.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337356566353933623739376266656434363734343263623361326135 Feb 12 22:24:52.565578 env[1647]: time="2024-02-12T22:24:52.565534307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-74mh9,Uid:f9de275d-94dd-4478-a473-a447bec507f6,Namespace:default,Attempt:1,} returns sandbox id \"375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59\"" Feb 12 22:24:52.568309 env[1647]: time="2024-02-12T22:24:52.568276720Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 22:24:52.745071 kubelet[2108]: E0212 22:24:52.744932 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:52.830250 systemd[1]: run-netns-cni\x2dc6a81b71\x2d68b4\x2d7950\x2dedd9\x2d705fa0e2044d.mount: Deactivated successfully. Feb 12 22:24:52.847678 kubelet[2108]: I0212 22:24:52.847648 2108 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 22:24:52.848375 kubelet[2108]: I0212 22:24:52.848358 2108 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 22:24:53.745383 kubelet[2108]: E0212 22:24:53.745335 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:54.365945 systemd-networkd[1459]: calif3b04ce2cf2: Gained IPv6LL Feb 12 22:24:54.746230 kubelet[2108]: E0212 22:24:54.746109 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:54.824668 systemd[1]: run-containerd-runc-k8s.io-a941731937d31cda0ed7da1693f7e6b93a32e38a71fb17b6222c79b14d8654db-runc.dhPGYg.mount: Deactivated successfully. Feb 12 22:24:55.747017 kubelet[2108]: E0212 22:24:55.746978 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:56.747429 kubelet[2108]: E0212 22:24:56.747354 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:57.013864 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount615369384.mount: Deactivated successfully. Feb 12 22:24:57.747843 kubelet[2108]: E0212 22:24:57.747803 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:58.445395 env[1647]: time="2024-02-12T22:24:58.445343824Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:58.448577 env[1647]: time="2024-02-12T22:24:58.448532278Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:58.451299 env[1647]: time="2024-02-12T22:24:58.451259813Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:58.453901 env[1647]: time="2024-02-12T22:24:58.453863492Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:58.454740 env[1647]: time="2024-02-12T22:24:58.454701694Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 22:24:58.456731 env[1647]: time="2024-02-12T22:24:58.456698527Z" level=info msg="CreateContainer within sandbox \"375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 22:24:58.474748 env[1647]: time="2024-02-12T22:24:58.474702124Z" level=info msg="CreateContainer within sandbox \"375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3d04ec58ea1e0ed38f984125cb62786656291450a2fb20a962d88f3f11f72206\"" Feb 12 22:24:58.475422 env[1647]: time="2024-02-12T22:24:58.475384464Z" level=info msg="StartContainer for \"3d04ec58ea1e0ed38f984125cb62786656291450a2fb20a962d88f3f11f72206\"" Feb 12 22:24:58.504271 systemd[1]: Started cri-containerd-3d04ec58ea1e0ed38f984125cb62786656291450a2fb20a962d88f3f11f72206.scope. Feb 12 22:24:58.518147 kernel: kauditd_printk_skb: 136 callbacks suppressed Feb 12 22:24:58.518273 kernel: audit: type=1400 audit(1707776698.515:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.525566 kernel: audit: type=1400 audit(1707776698.515:830): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.529882 kernel: audit: type=1400 audit(1707776698.515:831): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.538722 kernel: audit: type=1400 audit(1707776698.515:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.538834 kernel: audit: type=1400 audit(1707776698.515:833): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.543182 kernel: audit: type=1400 audit(1707776698.515:834): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.547750 kernel: audit: type=1400 audit(1707776698.515:835): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.552012 kernel: audit: type=1400 audit(1707776698.515:836): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.560513 kernel: audit: type=1400 audit(1707776698.515:837): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.560628 kernel: audit: type=1400 audit(1707776698.516:838): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.516000 audit: BPF prog-id=111 op=LOAD Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3471 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:58.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364303465633538656131653065643338663938343132356362363237 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3471 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:58.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364303465633538656131653065643338663938343132356362363237 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.520000 audit: BPF prog-id=112 op=LOAD Feb 12 22:24:58.520000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00037a4c0 items=0 ppid=3471 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:58.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364303465633538656131653065643338663938343132356362363237 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit: BPF prog-id=113 op=LOAD Feb 12 22:24:58.524000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00037a508 items=0 ppid=3471 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:58.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364303465633538656131653065643338663938343132356362363237 Feb 12 22:24:58.524000 audit: BPF prog-id=113 op=UNLOAD Feb 12 22:24:58.524000 audit: BPF prog-id=112 op=UNLOAD Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:58.524000 audit: BPF prog-id=114 op=LOAD Feb 12 22:24:58.524000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00037a918 items=0 ppid=3471 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:58.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364303465633538656131653065643338663938343132356362363237 Feb 12 22:24:58.621978 env[1647]: time="2024-02-12T22:24:58.621908614Z" level=info msg="StartContainer for \"3d04ec58ea1e0ed38f984125cb62786656291450a2fb20a962d88f3f11f72206\" returns successfully" Feb 12 22:24:58.698504 kubelet[2108]: E0212 22:24:58.698392 2108 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:58.707493 env[1647]: time="2024-02-12T22:24:58.707429661Z" level=info msg="StopPodSandbox for \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\"" Feb 12 22:24:58.748663 kubelet[2108]: E0212 22:24:58.748602 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.780 [WARNING][3607] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-csi--node--driver--ghldj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e94dc6ea-cdbf-422e-a5e4-f121be40444c", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f", Pod:"csi-node-driver-ghldj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali257cf29a966", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.780 [INFO][3607] k8s.go 578: Cleaning up netns ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.780 [INFO][3607] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" iface="eth0" netns="" Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.780 [INFO][3607] k8s.go 585: Releasing IP address(es) ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.780 [INFO][3607] utils.go 188: Calico CNI releasing IP address ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.804 [INFO][3613] ipam_plugin.go 415: Releasing address using handleID ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" HandleID="k8s-pod-network.da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.805 [INFO][3613] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.805 [INFO][3613] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.814 [WARNING][3613] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" HandleID="k8s-pod-network.da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.814 [INFO][3613] ipam_plugin.go 443: Releasing address using workloadID ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" HandleID="k8s-pod-network.da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.816 [INFO][3613] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:58.818304 env[1647]: 2024-02-12 22:24:58.817 [INFO][3607] k8s.go 591: Teardown processing complete. ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:58.818919 env[1647]: time="2024-02-12T22:24:58.818375224Z" level=info msg="TearDown network for sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\" successfully" Feb 12 22:24:58.818919 env[1647]: time="2024-02-12T22:24:58.818412235Z" level=info msg="StopPodSandbox for \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\" returns successfully" Feb 12 22:24:58.819682 env[1647]: time="2024-02-12T22:24:58.819644648Z" level=info msg="RemovePodSandbox for \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\"" Feb 12 22:24:58.819805 env[1647]: time="2024-02-12T22:24:58.819680384Z" level=info msg="Forcibly stopping sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\"" Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.874 [WARNING][3631] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-csi--node--driver--ghldj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e94dc6ea-cdbf-422e-a5e4-f121be40444c", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"cb942d9e8c3afdf61a0a6b06dfeb3dbee4b2a00d6a44fb99ccd8a7ecc9fc646f", Pod:"csi-node-driver-ghldj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali257cf29a966", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.874 [INFO][3631] k8s.go 578: Cleaning up netns ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.874 [INFO][3631] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" iface="eth0" netns="" Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.874 [INFO][3631] k8s.go 585: Releasing IP address(es) ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.874 [INFO][3631] utils.go 188: Calico CNI releasing IP address ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.911 [INFO][3637] ipam_plugin.go 415: Releasing address using handleID ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" HandleID="k8s-pod-network.da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.911 [INFO][3637] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.912 [INFO][3637] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.920 [WARNING][3637] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" HandleID="k8s-pod-network.da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.920 [INFO][3637] ipam_plugin.go 443: Releasing address using workloadID ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" HandleID="k8s-pod-network.da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Workload="172.31.23.13-k8s-csi--node--driver--ghldj-eth0" Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.922 [INFO][3637] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:58.924197 env[1647]: 2024-02-12 22:24:58.923 [INFO][3631] k8s.go 591: Teardown processing complete. ContainerID="da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765" Feb 12 22:24:58.924964 env[1647]: time="2024-02-12T22:24:58.924239424Z" level=info msg="TearDown network for sandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\" successfully" Feb 12 22:24:58.928459 env[1647]: time="2024-02-12T22:24:58.928406618Z" level=info msg="RemovePodSandbox \"da6ac957e79355b9b50192de0ffe253c96c65c7dc37450b57bed56b20f5eb765\" returns successfully" Feb 12 22:24:58.929038 env[1647]: time="2024-02-12T22:24:58.928997233Z" level=info msg="StopPodSandbox for \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\"" Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.964 [WARNING][3655] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"f9de275d-94dd-4478-a473-a447bec507f6", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59", Pod:"nginx-deployment-8ffc5cf85-74mh9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif3b04ce2cf2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.964 [INFO][3655] k8s.go 578: Cleaning up netns ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.964 [INFO][3655] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" iface="eth0" netns="" Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.964 [INFO][3655] k8s.go 585: Releasing IP address(es) ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.964 [INFO][3655] utils.go 188: Calico CNI releasing IP address ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.987 [INFO][3661] ipam_plugin.go 415: Releasing address using handleID ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" HandleID="k8s-pod-network.672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.987 [INFO][3661] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.987 [INFO][3661] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.996 [WARNING][3661] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" HandleID="k8s-pod-network.672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.996 [INFO][3661] ipam_plugin.go 443: Releasing address using workloadID ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" HandleID="k8s-pod-network.672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.998 [INFO][3661] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:59.000835 env[1647]: 2024-02-12 22:24:58.999 [INFO][3655] k8s.go 591: Teardown processing complete. ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:59.002604 env[1647]: time="2024-02-12T22:24:59.000799027Z" level=info msg="TearDown network for sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\" successfully" Feb 12 22:24:59.002696 env[1647]: time="2024-02-12T22:24:59.002607294Z" level=info msg="StopPodSandbox for \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\" returns successfully" Feb 12 22:24:59.003176 env[1647]: time="2024-02-12T22:24:59.003142255Z" level=info msg="RemovePodSandbox for \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\"" Feb 12 22:24:59.003318 env[1647]: time="2024-02-12T22:24:59.003181357Z" level=info msg="Forcibly stopping sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\"" Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.050 [WARNING][3679] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"f9de275d-94dd-4478-a473-a447bec507f6", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"375ef593b797bfed467442cb3a2a54a756a0d412c0afb57f79584c50340fed59", Pod:"nginx-deployment-8ffc5cf85-74mh9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif3b04ce2cf2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.050 [INFO][3679] k8s.go 578: Cleaning up netns ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.050 [INFO][3679] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" iface="eth0" netns="" Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.051 [INFO][3679] k8s.go 585: Releasing IP address(es) ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.051 [INFO][3679] utils.go 188: Calico CNI releasing IP address ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.082 [INFO][3685] ipam_plugin.go 415: Releasing address using handleID ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" HandleID="k8s-pod-network.672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.082 [INFO][3685] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.082 [INFO][3685] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.090 [WARNING][3685] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" HandleID="k8s-pod-network.672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.090 [INFO][3685] ipam_plugin.go 443: Releasing address using workloadID ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" HandleID="k8s-pod-network.672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Workload="172.31.23.13-k8s-nginx--deployment--8ffc5cf85--74mh9-eth0" Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.093 [INFO][3685] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:59.095987 env[1647]: 2024-02-12 22:24:59.094 [INFO][3679] k8s.go 591: Teardown processing complete. ContainerID="672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41" Feb 12 22:24:59.097115 env[1647]: time="2024-02-12T22:24:59.097072063Z" level=info msg="TearDown network for sandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\" successfully" Feb 12 22:24:59.103307 env[1647]: time="2024-02-12T22:24:59.103261734Z" level=info msg="RemovePodSandbox \"672155320880740ffa99dc9309f94ca565022d348f21c2f929c9674df2e77e41\" returns successfully" Feb 12 22:24:59.297090 kubelet[2108]: I0212 22:24:59.297056 2108 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-74mh9" podStartSLOduration=-9.22337201355777e+09 pod.CreationTimestamp="2024-02-12 22:24:36 +0000 UTC" firstStartedPulling="2024-02-12 22:24:52.567453895 +0000 UTC m=+54.396000021" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:24:59.296754811 +0000 UTC m=+61.125300939" watchObservedRunningTime="2024-02-12 22:24:59.297006142 +0000 UTC m=+61.125552275" Feb 12 22:24:59.318582 kubelet[2108]: I0212 22:24:59.318542 2108 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:24:59.325625 systemd[1]: Created slice kubepods-besteffort-podfbb27f1f_30d4_4009_96fa_165f3518cb9a.slice. Feb 12 22:24:59.379000 audit[3718]: NETFILTER_CFG table=filter:85 family=2 entries=7 op=nft_register_rule pid=3718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:59.379000 audit[3718]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc9ad601b0 a2=0 a3=7ffc9ad6019c items=0 ppid=2317 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:59.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:59.385000 audit[3718]: NETFILTER_CFG table=nat:86 family=2 entries=78 op=nft_register_rule pid=3718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:59.385000 audit[3718]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc9ad601b0 a2=0 a3=7ffc9ad6019c items=0 ppid=2317 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:59.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:59.427000 audit[3747]: NETFILTER_CFG table=filter:87 family=2 entries=8 op=nft_register_rule pid=3747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:59.427000 audit[3747]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff32772b70 a2=0 a3=7fff32772b5c items=0 ppid=2317 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:59.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:59.428000 audit[3747]: NETFILTER_CFG table=nat:88 family=2 entries=78 op=nft_register_rule pid=3747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:59.428000 audit[3747]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff32772b70 a2=0 a3=7fff32772b5c items=0 ppid=2317 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:59.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:59.447389 kubelet[2108]: I0212 22:24:59.447350 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fbb27f1f-30d4-4009-96fa-165f3518cb9a-calico-apiserver-certs\") pod \"calico-apiserver-5cc4d9f49-7ll25\" (UID: \"fbb27f1f-30d4-4009-96fa-165f3518cb9a\") " pod="calico-apiserver/calico-apiserver-5cc4d9f49-7ll25" Feb 12 22:24:59.448674 kubelet[2108]: I0212 22:24:59.448651 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5zgxx\" (UniqueName: \"kubernetes.io/projected/fbb27f1f-30d4-4009-96fa-165f3518cb9a-kube-api-access-5zgxx\") pod \"calico-apiserver-5cc4d9f49-7ll25\" (UID: \"fbb27f1f-30d4-4009-96fa-165f3518cb9a\") " pod="calico-apiserver/calico-apiserver-5cc4d9f49-7ll25" Feb 12 22:24:59.551094 kubelet[2108]: E0212 22:24:59.550966 2108 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 22:24:59.551094 kubelet[2108]: E0212 22:24:59.551085 2108 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/fbb27f1f-30d4-4009-96fa-165f3518cb9a-calico-apiserver-certs podName:fbb27f1f-30d4-4009-96fa-165f3518cb9a nodeName:}" failed. No retries permitted until 2024-02-12 22:25:00.051050052 +0000 UTC m=+61.879596178 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/fbb27f1f-30d4-4009-96fa-165f3518cb9a-calico-apiserver-certs") pod "calico-apiserver-5cc4d9f49-7ll25" (UID: "fbb27f1f-30d4-4009-96fa-165f3518cb9a") : secret "calico-apiserver-certs" not found Feb 12 22:24:59.749689 kubelet[2108]: E0212 22:24:59.749640 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:00.235378 env[1647]: time="2024-02-12T22:25:00.235323176Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc4d9f49-7ll25,Uid:fbb27f1f-30d4-4009-96fa-165f3518cb9a,Namespace:calico-apiserver,Attempt:0,}" Feb 12 22:25:00.503315 (udev-worker)[3720]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:25:00.504336 systemd-networkd[1459]: cali256a291cc6b: Link UP Feb 12 22:25:00.509093 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:25:00.509189 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali256a291cc6b: link becomes ready Feb 12 22:25:00.508930 systemd-networkd[1459]: cali256a291cc6b: Gained carrier Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.311 [INFO][3750] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0 calico-apiserver-5cc4d9f49- calico-apiserver fbb27f1f-30d4-4009-96fa-165f3518cb9a 1070 0 2024-02-12 22:24:59 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cc4d9f49 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.23.13 calico-apiserver-5cc4d9f49-7ll25 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali256a291cc6b [] []}} ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-7ll25" WorkloadEndpoint="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.311 [INFO][3750] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-7ll25" WorkloadEndpoint="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.374 [INFO][3762] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" HandleID="k8s-pod-network.35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Workload="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.390 [INFO][3762] ipam_plugin.go 268: Auto assigning IP ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" HandleID="k8s-pod-network.35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Workload="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c00b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.23.13", "pod":"calico-apiserver-5cc4d9f49-7ll25", "timestamp":"2024-02-12 22:25:00.374120453 +0000 UTC"}, Hostname:"172.31.23.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.390 [INFO][3762] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.390 [INFO][3762] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.390 [INFO][3762] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.23.13' Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.394 [INFO][3762] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" host="172.31.23.13" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.410 [INFO][3762] ipam.go 372: Looking up existing affinities for host host="172.31.23.13" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.418 [INFO][3762] ipam.go 489: Trying affinity for 192.168.19.192/26 host="172.31.23.13" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.422 [INFO][3762] ipam.go 155: Attempting to load block cidr=192.168.19.192/26 host="172.31.23.13" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.444 [INFO][3762] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.192/26 host="172.31.23.13" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.444 [INFO][3762] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.192/26 handle="k8s-pod-network.35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" host="172.31.23.13" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.457 [INFO][3762] ipam.go 1682: Creating new handle: k8s-pod-network.35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654 Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.475 [INFO][3762] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.192/26 handle="k8s-pod-network.35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" host="172.31.23.13" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.498 [INFO][3762] ipam.go 1216: Successfully claimed IPs: [192.168.19.195/26] block=192.168.19.192/26 handle="k8s-pod-network.35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" host="172.31.23.13" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.498 [INFO][3762] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.195/26] handle="k8s-pod-network.35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" host="172.31.23.13" Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.498 [INFO][3762] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:25:00.524426 env[1647]: 2024-02-12 22:25:00.498 [INFO][3762] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.195/26] IPv6=[] ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" HandleID="k8s-pod-network.35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Workload="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0" Feb 12 22:25:00.525575 env[1647]: 2024-02-12 22:25:00.500 [INFO][3750] k8s.go 385: Populated endpoint ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-7ll25" WorkloadEndpoint="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0", GenerateName:"calico-apiserver-5cc4d9f49-", Namespace:"calico-apiserver", SelfLink:"", UID:"fbb27f1f-30d4-4009-96fa-165f3518cb9a", ResourceVersion:"1070", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc4d9f49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"", Pod:"calico-apiserver-5cc4d9f49-7ll25", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.19.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali256a291cc6b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:25:00.525575 env[1647]: 2024-02-12 22:25:00.500 [INFO][3750] k8s.go 386: Calico CNI using IPs: [192.168.19.195/32] ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-7ll25" WorkloadEndpoint="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0" Feb 12 22:25:00.525575 env[1647]: 2024-02-12 22:25:00.500 [INFO][3750] dataplane_linux.go 68: Setting the host side veth name to cali256a291cc6b ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-7ll25" WorkloadEndpoint="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0" Feb 12 22:25:00.525575 env[1647]: 2024-02-12 22:25:00.509 [INFO][3750] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-7ll25" WorkloadEndpoint="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0" Feb 12 22:25:00.525575 env[1647]: 2024-02-12 22:25:00.510 [INFO][3750] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-7ll25" WorkloadEndpoint="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0", GenerateName:"calico-apiserver-5cc4d9f49-", Namespace:"calico-apiserver", SelfLink:"", UID:"fbb27f1f-30d4-4009-96fa-165f3518cb9a", ResourceVersion:"1070", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc4d9f49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654", Pod:"calico-apiserver-5cc4d9f49-7ll25", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.19.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali256a291cc6b", MAC:"b6:73:72:a4:23:00", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:25:00.525575 env[1647]: 2024-02-12 22:25:00.523 [INFO][3750] k8s.go 491: Wrote updated endpoint to datastore ContainerID="35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-7ll25" WorkloadEndpoint="172.31.23.13-k8s-calico--apiserver--5cc4d9f49--7ll25-eth0" Feb 12 22:25:00.554916 env[1647]: time="2024-02-12T22:25:00.554838520Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:25:00.555085 env[1647]: time="2024-02-12T22:25:00.554931842Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:25:00.555085 env[1647]: time="2024-02-12T22:25:00.554962110Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:25:00.555223 env[1647]: time="2024-02-12T22:25:00.555138115Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654 pid=3788 runtime=io.containerd.runc.v2 Feb 12 22:25:00.588342 systemd[1]: Started cri-containerd-35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654.scope. Feb 12 22:25:00.600000 audit[3814]: NETFILTER_CFG table=filter:89 family=2 entries=57 op=nft_register_chain pid=3814 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:25:00.600000 audit[3814]: SYSCALL arch=c000003e syscall=46 success=yes exit=29768 a0=3 a1=7ffce389c990 a2=0 a3=7ffce389c97c items=0 ppid=3043 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:25:00.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.618000 audit: BPF prog-id=115 op=LOAD Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3788 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335653662363630666437646466383533356234316262636138643539 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3788 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335653662363630666437646466383533356234316262636138643539 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit: BPF prog-id=116 op=LOAD Feb 12 22:25:00.619000 audit[3800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025530 items=0 ppid=3788 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335653662363630666437646466383533356234316262636138643539 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.619000 audit: BPF prog-id=117 op=LOAD Feb 12 22:25:00.619000 audit[3800]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025578 items=0 ppid=3788 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335653662363630666437646466383533356234316262636138643539 Feb 12 22:25:00.619000 audit: BPF prog-id=117 op=UNLOAD Feb 12 22:25:00.619000 audit: BPF prog-id=116 op=UNLOAD Feb 12 22:25:00.620000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.620000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.620000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.620000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.620000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.620000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.620000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.620000 audit[3800]: AVC avc: denied { perfmon } for pid=3800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.620000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.620000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.620000 audit: BPF prog-id=118 op=LOAD Feb 12 22:25:00.620000 audit[3800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025988 items=0 ppid=3788 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335653662363630666437646466383533356234316262636138643539 Feb 12 22:25:00.656004 env[1647]: time="2024-02-12T22:25:00.655952429Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc4d9f49-7ll25,Uid:fbb27f1f-30d4-4009-96fa-165f3518cb9a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654\"" Feb 12 22:25:00.658166 env[1647]: time="2024-02-12T22:25:00.658129467Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 22:25:00.750268 kubelet[2108]: E0212 22:25:00.750217 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:01.750938 kubelet[2108]: E0212 22:25:01.750886 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:01.853907 systemd-networkd[1459]: cali256a291cc6b: Gained IPv6LL Feb 12 22:25:02.335517 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4210879937.mount: Deactivated successfully. Feb 12 22:25:02.752676 kubelet[2108]: E0212 22:25:02.752549 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:03.755577 kubelet[2108]: E0212 22:25:03.755503 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:04.756670 kubelet[2108]: E0212 22:25:04.756486 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:05.389991 env[1647]: time="2024-02-12T22:25:05.389939956Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:05.392901 env[1647]: time="2024-02-12T22:25:05.392850065Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:05.395450 env[1647]: time="2024-02-12T22:25:05.395393895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:05.398344 env[1647]: time="2024-02-12T22:25:05.398288314Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:05.399087 env[1647]: time="2024-02-12T22:25:05.399048578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 22:25:05.401479 env[1647]: time="2024-02-12T22:25:05.401437851Z" level=info msg="CreateContainer within sandbox \"35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 22:25:05.417875 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2983004527.mount: Deactivated successfully. Feb 12 22:25:05.470021 env[1647]: time="2024-02-12T22:25:05.469953804Z" level=info msg="CreateContainer within sandbox \"35e6b660fd7ddf8535b41bbca8d594cc3322b4bde03ba090ed262bcaf169c654\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"624f00ccb7294deb21cb3b937b1fadc042b9b220709f113771e70e75d973053a\"" Feb 12 22:25:05.470765 env[1647]: time="2024-02-12T22:25:05.470683420Z" level=info msg="StartContainer for \"624f00ccb7294deb21cb3b937b1fadc042b9b220709f113771e70e75d973053a\"" Feb 12 22:25:05.503404 systemd[1]: Started cri-containerd-624f00ccb7294deb21cb3b937b1fadc042b9b220709f113771e70e75d973053a.scope. Feb 12 22:25:05.527069 kernel: kauditd_printk_skb: 119 callbacks suppressed Feb 12 22:25:05.527234 kernel: audit: type=1400 audit(1707776705.522:870): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.533546 kernel: audit: type=1400 audit(1707776705.522:871): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.533661 kernel: audit: type=1400 audit(1707776705.522:872): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.542766 kernel: audit: type=1400 audit(1707776705.522:873): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.551597 kernel: audit: type=1400 audit(1707776705.522:874): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.551739 kernel: audit: type=1400 audit(1707776705.522:875): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.556516 kernel: audit: type=1400 audit(1707776705.522:876): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.561483 kernel: audit: type=1400 audit(1707776705.522:877): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.566235 kernel: audit: type=1400 audit(1707776705.522:878): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.570697 kernel: audit: type=1400 audit(1707776705.523:879): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.523000 audit: BPF prog-id=119 op=LOAD Feb 12 22:25:05.526000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.526000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3788 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:05.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632346630306363623732393464656232316362336239333762316661 Feb 12 22:25:05.526000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.526000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3788 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:05.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632346630306363623732393464656232316362336239333762316661 Feb 12 22:25:05.527000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.527000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.527000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.527000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.527000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.527000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.527000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.527000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.527000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.527000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.527000 audit: BPF prog-id=120 op=LOAD Feb 12 22:25:05.527000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001f7f70 items=0 ppid=3788 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:05.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632346630306363623732393464656232316362336239333762316661 Feb 12 22:25:05.528000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.528000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.528000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.528000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.528000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.528000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.528000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.528000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.528000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.528000 audit: BPF prog-id=121 op=LOAD Feb 12 22:25:05.528000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001f7fb8 items=0 ppid=3788 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:05.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632346630306363623732393464656232316362336239333762316661 Feb 12 22:25:05.536000 audit: BPF prog-id=121 op=UNLOAD Feb 12 22:25:05.536000 audit: BPF prog-id=120 op=UNLOAD Feb 12 22:25:05.536000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.536000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.536000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.536000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.536000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.536000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.536000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.536000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.536000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.536000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:05.536000 audit: BPF prog-id=122 op=LOAD Feb 12 22:25:05.536000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003543c8 items=0 ppid=3788 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:05.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632346630306363623732393464656232316362336239333762316661 Feb 12 22:25:05.592451 env[1647]: time="2024-02-12T22:25:05.592361573Z" level=info msg="StartContainer for \"624f00ccb7294deb21cb3b937b1fadc042b9b220709f113771e70e75d973053a\" returns successfully" Feb 12 22:25:05.757219 kubelet[2108]: E0212 22:25:05.757080 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:06.326740 kubelet[2108]: I0212 22:25:06.326563 2108 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5cc4d9f49-7ll25" podStartSLOduration=-9.223372029528278e+09 pod.CreationTimestamp="2024-02-12 22:24:59 +0000 UTC" firstStartedPulling="2024-02-12 22:25:00.657269663 +0000 UTC m=+62.485815783" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:25:06.324830704 +0000 UTC m=+68.153376836" watchObservedRunningTime="2024-02-12 22:25:06.326497354 +0000 UTC m=+68.155043488" Feb 12 22:25:06.412742 systemd[1]: run-containerd-runc-k8s.io-624f00ccb7294deb21cb3b937b1fadc042b9b220709f113771e70e75d973053a-runc.HttRTA.mount: Deactivated successfully. Feb 12 22:25:06.438000 audit[3895]: NETFILTER_CFG table=filter:90 family=2 entries=8 op=nft_register_rule pid=3895 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:06.438000 audit[3895]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffeebf6f070 a2=0 a3=7ffeebf6f05c items=0 ppid=2317 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:06.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:06.442000 audit[3895]: NETFILTER_CFG table=nat:91 family=2 entries=78 op=nft_register_rule pid=3895 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:06.442000 audit[3895]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffeebf6f070 a2=0 a3=7ffeebf6f05c items=0 ppid=2317 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:06.442000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:06.661000 audit[3851]: AVC avc: denied { watch } for pid=3851 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_25_00.1686205141/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c666 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c329,c666 tclass=file permissive=0 Feb 12 22:25:06.661000 audit[3851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aab780 a2=fc6 a3=0 items=0 ppid=3788 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c666 key=(null) Feb 12 22:25:06.661000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:25:06.757410 kubelet[2108]: E0212 22:25:06.757343 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:07.757975 kubelet[2108]: E0212 22:25:07.757938 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:07.759000 audit[3928]: NETFILTER_CFG table=filter:92 family=2 entries=8 op=nft_register_rule pid=3928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:07.759000 audit[3928]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc47e1c230 a2=0 a3=7ffc47e1c21c items=0 ppid=2317 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:07.759000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:07.762000 audit[3928]: NETFILTER_CFG table=nat:93 family=2 entries=78 op=nft_register_rule pid=3928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:07.762000 audit[3928]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc47e1c230 a2=0 a3=7ffc47e1c21c items=0 ppid=2317 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:07.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:08.758874 kubelet[2108]: E0212 22:25:08.758818 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:09.416000 audit[3955]: NETFILTER_CFG table=filter:94 family=2 entries=20 op=nft_register_rule pid=3955 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:09.416000 audit[3955]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffd84d47ac0 a2=0 a3=7ffd84d47aac items=0 ppid=2317 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.419000 audit[3955]: NETFILTER_CFG table=nat:95 family=2 entries=78 op=nft_register_rule pid=3955 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:09.419000 audit[3955]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd84d47ac0 a2=0 a3=7ffd84d47aac items=0 ppid=2317 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.467000 audit[3981]: NETFILTER_CFG table=filter:96 family=2 entries=32 op=nft_register_rule pid=3981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:09.467000 audit[3981]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7fff724c22e0 a2=0 a3=7fff724c22cc items=0 ppid=2317 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.469000 audit[3981]: NETFILTER_CFG table=nat:97 family=2 entries=78 op=nft_register_rule pid=3981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:09.469000 audit[3981]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff724c22e0 a2=0 a3=7fff724c22cc items=0 ppid=2317 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.469000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.646631 kubelet[2108]: I0212 22:25:09.646386 2108 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:25:09.656625 systemd[1]: Created slice kubepods-besteffort-pod8466a09b_3b83_461e_8f15_b8e70e046195.slice. Feb 12 22:25:09.724725 kubelet[2108]: I0212 22:25:09.723760 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xb95k\" (UniqueName: \"kubernetes.io/projected/8466a09b-3b83-461e-8f15-b8e70e046195-kube-api-access-xb95k\") pod \"nfs-server-provisioner-0\" (UID: \"8466a09b-3b83-461e-8f15-b8e70e046195\") " pod="default/nfs-server-provisioner-0" Feb 12 22:25:09.724725 kubelet[2108]: I0212 22:25:09.723826 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/8466a09b-3b83-461e-8f15-b8e70e046195-data\") pod \"nfs-server-provisioner-0\" (UID: \"8466a09b-3b83-461e-8f15-b8e70e046195\") " pod="default/nfs-server-provisioner-0" Feb 12 22:25:09.759779 kubelet[2108]: E0212 22:25:09.759730 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:09.962688 env[1647]: time="2024-02-12T22:25:09.962628874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8466a09b-3b83-461e-8f15-b8e70e046195,Namespace:default,Attempt:0,}" Feb 12 22:25:10.208010 systemd-networkd[1459]: cali60e51b789ff: Link UP Feb 12 22:25:10.217918 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:25:10.218091 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 22:25:10.210590 (udev-worker)[4003]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:25:10.216733 systemd-networkd[1459]: cali60e51b789ff: Gained carrier Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.091 [INFO][3984] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.23.13-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 8466a09b-3b83-461e-8f15-b8e70e046195 1139 0 2024-02-12 22:25:09 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.23.13 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.23.13-k8s-nfs--server--provisioner--0-" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.091 [INFO][3984] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.23.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.131 [INFO][3996] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" HandleID="k8s-pod-network.cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Workload="172.31.23.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.144 [INFO][3996] ipam_plugin.go 268: Auto assigning IP ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" HandleID="k8s-pod-network.cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Workload="172.31.23.13-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d9d0), Attrs:map[string]string{"namespace":"default", "node":"172.31.23.13", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 22:25:10.131578925 +0000 UTC"}, Hostname:"172.31.23.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.144 [INFO][3996] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.144 [INFO][3996] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.144 [INFO][3996] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.23.13' Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.148 [INFO][3996] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" host="172.31.23.13" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.158 [INFO][3996] ipam.go 372: Looking up existing affinities for host host="172.31.23.13" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.163 [INFO][3996] ipam.go 489: Trying affinity for 192.168.19.192/26 host="172.31.23.13" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.167 [INFO][3996] ipam.go 155: Attempting to load block cidr=192.168.19.192/26 host="172.31.23.13" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.176 [INFO][3996] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.192/26 host="172.31.23.13" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.176 [INFO][3996] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.192/26 handle="k8s-pod-network.cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" host="172.31.23.13" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.179 [INFO][3996] ipam.go 1682: Creating new handle: k8s-pod-network.cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.184 [INFO][3996] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.192/26 handle="k8s-pod-network.cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" host="172.31.23.13" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.199 [INFO][3996] ipam.go 1216: Successfully claimed IPs: [192.168.19.196/26] block=192.168.19.192/26 handle="k8s-pod-network.cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" host="172.31.23.13" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.199 [INFO][3996] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.196/26] handle="k8s-pod-network.cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" host="172.31.23.13" Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.199 [INFO][3996] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:25:10.234066 env[1647]: 2024-02-12 22:25:10.199 [INFO][3996] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.196/26] IPv6=[] ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" HandleID="k8s-pod-network.cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Workload="172.31.23.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:25:10.234865 env[1647]: 2024-02-12 22:25:10.201 [INFO][3984] k8s.go 385: Populated endpoint ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.23.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8466a09b-3b83-461e-8f15-b8e70e046195", ResourceVersion:"1139", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 25, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.19.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:25:10.234865 env[1647]: 2024-02-12 22:25:10.201 [INFO][3984] k8s.go 386: Calico CNI using IPs: [192.168.19.196/32] ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.23.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:25:10.234865 env[1647]: 2024-02-12 22:25:10.201 [INFO][3984] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.23.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:25:10.234865 env[1647]: 2024-02-12 22:25:10.218 [INFO][3984] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.23.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:25:10.235214 env[1647]: 2024-02-12 22:25:10.219 [INFO][3984] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.23.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8466a09b-3b83-461e-8f15-b8e70e046195", ResourceVersion:"1139", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 25, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.19.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"7e:18:d3:c2:6e:aa", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:25:10.235214 env[1647]: 2024-02-12 22:25:10.232 [INFO][3984] k8s.go 491: Wrote updated endpoint to datastore ContainerID="cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.23.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 22:25:10.261471 env[1647]: time="2024-02-12T22:25:10.261366450Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:25:10.261763 env[1647]: time="2024-02-12T22:25:10.261436070Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:25:10.261763 env[1647]: time="2024-02-12T22:25:10.261470189Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:25:10.261918 env[1647]: time="2024-02-12T22:25:10.261758307Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b pid=4024 runtime=io.containerd.runc.v2 Feb 12 22:25:10.278000 audit[4034]: NETFILTER_CFG table=filter:98 family=2 entries=38 op=nft_register_chain pid=4034 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:25:10.278000 audit[4034]: SYSCALL arch=c000003e syscall=46 success=yes exit=19484 a0=3 a1=7ffe5a532930 a2=0 a3=7ffe5a53291c items=0 ppid=3043 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:10.278000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:25:10.300878 systemd[1]: Started cri-containerd-cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b.scope. Feb 12 22:25:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.319000 audit: BPF prog-id=123 op=LOAD Feb 12 22:25:10.321000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.321000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4024 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:10.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303865363130636636646237656265313262653338333737393132 Feb 12 22:25:10.321000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.321000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4024 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:10.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303865363130636636646237656265313262653338333737393132 Feb 12 22:25:10.322000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.322000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.322000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.322000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.322000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.322000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.322000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.322000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.322000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.322000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.322000 audit: BPF prog-id=124 op=LOAD Feb 12 22:25:10.322000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024800 items=0 ppid=4024 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:10.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303865363130636636646237656265313262653338333737393132 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit: BPF prog-id=125 op=LOAD Feb 12 22:25:10.323000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024848 items=0 ppid=4024 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:10.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303865363130636636646237656265313262653338333737393132 Feb 12 22:25:10.323000 audit: BPF prog-id=125 op=UNLOAD Feb 12 22:25:10.323000 audit: BPF prog-id=124 op=UNLOAD Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:10.323000 audit: BPF prog-id=126 op=LOAD Feb 12 22:25:10.323000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024c58 items=0 ppid=4024 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:10.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303865363130636636646237656265313262653338333737393132 Feb 12 22:25:10.360425 env[1647]: time="2024-02-12T22:25:10.360380043Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8466a09b-3b83-461e-8f15-b8e70e046195,Namespace:default,Attempt:0,} returns sandbox id \"cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b\"" Feb 12 22:25:10.362622 env[1647]: time="2024-02-12T22:25:10.362487049Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 22:25:10.759922 kubelet[2108]: E0212 22:25:10.759876 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:11.760721 kubelet[2108]: E0212 22:25:11.760670 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:11.838428 systemd-networkd[1459]: cali60e51b789ff: Gained IPv6LL Feb 12 22:25:12.761153 kubelet[2108]: E0212 22:25:12.761100 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:13.761397 kubelet[2108]: E0212 22:25:13.761339 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:14.341834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount86202811.mount: Deactivated successfully. Feb 12 22:25:14.762554 kubelet[2108]: E0212 22:25:14.761974 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:15.762905 kubelet[2108]: E0212 22:25:15.762829 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:16.763833 kubelet[2108]: E0212 22:25:16.763780 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:17.764624 kubelet[2108]: E0212 22:25:17.764419 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:18.091736 env[1647]: time="2024-02-12T22:25:18.091620741Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:18.099801 env[1647]: time="2024-02-12T22:25:18.099753554Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:18.106660 env[1647]: time="2024-02-12T22:25:18.106609654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:18.110828 env[1647]: time="2024-02-12T22:25:18.110780903Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:18.113140 env[1647]: time="2024-02-12T22:25:18.112959026Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 12 22:25:18.116755 env[1647]: time="2024-02-12T22:25:18.116706001Z" level=info msg="CreateContainer within sandbox \"cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 22:25:18.154144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount927070648.mount: Deactivated successfully. Feb 12 22:25:18.165729 env[1647]: time="2024-02-12T22:25:18.165667283Z" level=info msg="CreateContainer within sandbox \"cb08e610cf6db7ebe12be383779129c4f607b3355c70269a11acb63675a0744b\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"d39748a8c5ee5fe4167bdcfb257c2d8757bb8e27e86a0c0f855bb9e8e7c285f9\"" Feb 12 22:25:18.167670 env[1647]: time="2024-02-12T22:25:18.167323808Z" level=info msg="StartContainer for \"d39748a8c5ee5fe4167bdcfb257c2d8757bb8e27e86a0c0f855bb9e8e7c285f9\"" Feb 12 22:25:18.251820 systemd[1]: Started cri-containerd-d39748a8c5ee5fe4167bdcfb257c2d8757bb8e27e86a0c0f855bb9e8e7c285f9.scope. Feb 12 22:25:18.283807 kernel: kauditd_printk_skb: 134 callbacks suppressed Feb 12 22:25:18.283972 kernel: audit: type=1400 audit(1707776718.271:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.284068 kernel: audit: type=1400 audit(1707776718.271:917): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.293080 kernel: audit: type=1400 audit(1707776718.271:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.293192 kernel: audit: type=1400 audit(1707776718.271:919): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.293229 kernel: audit: type=1400 audit(1707776718.271:920): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.302623 kernel: audit: type=1400 audit(1707776718.271:921): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.318657 kernel: audit: type=1400 audit(1707776718.271:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.318770 kernel: audit: type=1400 audit(1707776718.271:923): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.318811 kernel: audit: type=1400 audit(1707776718.271:924): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.326510 kernel: audit: type=1400 audit(1707776718.272:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit: BPF prog-id=127 op=LOAD Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4024 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:18.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433393734386138633565653566653431363762646366623235376332 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4024 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:18.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433393734386138633565653566653431363762646366623235376332 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.272000 audit: BPF prog-id=128 op=LOAD Feb 12 22:25:18.272000 audit[4071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025190 items=0 ppid=4024 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:18.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433393734386138633565653566653431363762646366623235376332 Feb 12 22:25:18.273000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.273000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.273000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.273000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.273000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.273000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.273000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.273000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.273000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.273000 audit: BPF prog-id=129 op=LOAD Feb 12 22:25:18.273000 audit[4071]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000251d8 items=0 ppid=4024 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:18.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433393734386138633565653566653431363762646366623235376332 Feb 12 22:25:18.278000 audit: BPF prog-id=129 op=UNLOAD Feb 12 22:25:18.278000 audit: BPF prog-id=128 op=UNLOAD Feb 12 22:25:18.278000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.278000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.278000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.278000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.278000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.278000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.278000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.278000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.278000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.278000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:18.278000 audit: BPF prog-id=130 op=LOAD Feb 12 22:25:18.278000 audit[4071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000255e8 items=0 ppid=4024 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:18.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433393734386138633565653566653431363762646366623235376332 Feb 12 22:25:18.329313 env[1647]: time="2024-02-12T22:25:18.329126923Z" level=info msg="StartContainer for \"d39748a8c5ee5fe4167bdcfb257c2d8757bb8e27e86a0c0f855bb9e8e7c285f9\" returns successfully" Feb 12 22:25:18.355439 kubelet[2108]: I0212 22:25:18.352174 2108 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372027502666e+09 pod.CreationTimestamp="2024-02-12 22:25:09 +0000 UTC" firstStartedPulling="2024-02-12 22:25:10.362180463 +0000 UTC m=+72.190726575" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:25:18.351806322 +0000 UTC m=+80.180352453" watchObservedRunningTime="2024-02-12 22:25:18.352109106 +0000 UTC m=+80.180655238" Feb 12 22:25:18.399000 audit[4110]: AVC avc: denied { search } for pid=4110 comm="rpcbind" name="crypto" dev="proc" ino=25380 scontext=system_u:system_r:svirt_lxc_net_t:s0:c350,c597 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 22:25:18.399000 audit[4110]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f77100a90c0 a2=0 a3=0 items=0 ppid=4083 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c350,c597 key=(null) Feb 12 22:25:18.399000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 22:25:18.473000 audit[4132]: NETFILTER_CFG table=filter:99 family=2 entries=20 op=nft_register_rule pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:18.473000 audit[4132]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc5eac1dd0 a2=0 a3=7ffc5eac1dbc items=0 ppid=2317 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:18.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:18.482000 audit[4132]: NETFILTER_CFG table=nat:100 family=2 entries=162 op=nft_register_chain pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:18.482000 audit[4132]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffc5eac1dd0 a2=0 a3=7ffc5eac1dbc items=0 ppid=2317 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:18.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:18.494000 audit[4134]: AVC avc: denied { search } for pid=4134 comm="dbus-daemon" name="crypto" dev="proc" ino=25380 scontext=system_u:system_r:svirt_lxc_net_t:s0:c350,c597 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 22:25:18.494000 audit[4134]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f182d83b0c0 a2=0 a3=0 items=0 ppid=4083 pid=4134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c350,c597 key=(null) Feb 12 22:25:18.494000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 22:25:18.499000 audit[4135]: AVC avc: denied { watch } for pid=4135 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538163 scontext=system_u:system_r:svirt_lxc_net_t:s0:c350,c597 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c350,c597 tclass=dir permissive=0 Feb 12 22:25:18.499000 audit[4135]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55c3cffcf7e0 a2=2c8 a3=7ffcddfec3ec items=0 ppid=4083 pid=4135 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c350,c597 key=(null) Feb 12 22:25:18.499000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 22:25:18.503000 audit[4136]: AVC avc: denied { read } for pid=4136 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25529 scontext=system_u:system_r:svirt_lxc_net_t:s0:c350,c597 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 22:25:18.503000 audit[4136]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f10681e7320 a1=80000 a2=d a3=7ffe3444e7f0 items=0 ppid=4083 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c350,c597 key=(null) Feb 12 22:25:18.503000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 22:25:18.504000 audit[4136]: AVC avc: denied { search } for pid=4136 comm="ganesha.nfsd" name="crypto" dev="proc" ino=25380 scontext=system_u:system_r:svirt_lxc_net_t:s0:c350,c597 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 22:25:18.504000 audit[4136]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f106773b0c0 a2=0 a3=0 items=0 ppid=4083 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c350,c597 key=(null) Feb 12 22:25:18.504000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 22:25:18.698286 kubelet[2108]: E0212 22:25:18.698170 2108 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:18.765581 kubelet[2108]: E0212 22:25:18.765541 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:19.143577 systemd[1]: run-containerd-runc-k8s.io-d39748a8c5ee5fe4167bdcfb257c2d8757bb8e27e86a0c0f855bb9e8e7c285f9-runc.0dpurK.mount: Deactivated successfully. Feb 12 22:25:19.766113 kubelet[2108]: E0212 22:25:19.766063 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:20.766274 kubelet[2108]: E0212 22:25:20.766227 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:21.766648 kubelet[2108]: E0212 22:25:21.766596 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:22.767343 kubelet[2108]: E0212 22:25:22.767290 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:23.768185 kubelet[2108]: E0212 22:25:23.768130 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:24.768695 kubelet[2108]: E0212 22:25:24.768644 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:24.829785 systemd[1]: run-containerd-runc-k8s.io-a941731937d31cda0ed7da1693f7e6b93a32e38a71fb17b6222c79b14d8654db-runc.a0oihw.mount: Deactivated successfully. Feb 12 22:25:25.770005 kubelet[2108]: E0212 22:25:25.769953 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:26.770259 kubelet[2108]: E0212 22:25:26.770200 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:27.770359 kubelet[2108]: E0212 22:25:27.770310 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:28.770771 kubelet[2108]: E0212 22:25:28.770723 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:29.771454 kubelet[2108]: E0212 22:25:29.771412 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:30.263515 systemd[1]: run-containerd-runc-k8s.io-624f00ccb7294deb21cb3b937b1fadc042b9b220709f113771e70e75d973053a-runc.co10Ap.mount: Deactivated successfully. Feb 12 22:25:30.394000 audit[4231]: NETFILTER_CFG table=filter:101 family=2 entries=7 op=nft_register_rule pid=4231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:30.397126 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 22:25:30.397238 kernel: audit: type=1325 audit(1707776730.394:941): table=filter:101 family=2 entries=7 op=nft_register_rule pid=4231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:30.394000 audit[4231]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcf997f6c0 a2=0 a3=7ffcf997f6ac items=0 ppid=2317 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:30.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:30.410983 kernel: audit: type=1300 audit(1707776730.394:941): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcf997f6c0 a2=0 a3=7ffcf997f6ac items=0 ppid=2317 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:30.411134 kernel: audit: type=1327 audit(1707776730.394:941): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:30.411169 kernel: audit: type=1325 audit(1707776730.400:942): table=nat:102 family=2 entries=209 op=nft_register_chain pid=4231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:30.400000 audit[4231]: NETFILTER_CFG table=nat:102 family=2 entries=209 op=nft_register_chain pid=4231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:30.400000 audit[4231]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7ffcf997f6c0 a2=0 a3=7ffcf997f6ac items=0 ppid=2317 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:30.421622 kernel: audit: type=1300 audit(1707776730.400:942): arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7ffcf997f6c0 a2=0 a3=7ffcf997f6ac items=0 ppid=2317 pid=4231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:30.421812 kernel: audit: type=1327 audit(1707776730.400:942): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:30.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:30.772323 kubelet[2108]: E0212 22:25:30.772271 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:31.772747 kubelet[2108]: E0212 22:25:31.772708 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:32.773660 kubelet[2108]: E0212 22:25:32.773606 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:33.774402 kubelet[2108]: E0212 22:25:33.774364 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:34.774571 kubelet[2108]: E0212 22:25:34.774520 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:35.775372 kubelet[2108]: E0212 22:25:35.775320 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:36.776235 kubelet[2108]: E0212 22:25:36.776187 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:37.777044 kubelet[2108]: E0212 22:25:37.776974 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:38.698602 kubelet[2108]: E0212 22:25:38.698495 2108 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:38.778189 kubelet[2108]: E0212 22:25:38.778133 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:39.778859 kubelet[2108]: E0212 22:25:39.778802 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:40.779867 kubelet[2108]: E0212 22:25:40.779815 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:41.780465 kubelet[2108]: E0212 22:25:41.780409 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:42.781345 kubelet[2108]: E0212 22:25:42.781292 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:43.192525 kubelet[2108]: I0212 22:25:43.192481 2108 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:25:43.210106 systemd[1]: Created slice kubepods-besteffort-pod0cc7557f_e154_44c0_824e_fe909c4ff8b5.slice. Feb 12 22:25:43.255118 kubelet[2108]: I0212 22:25:43.255064 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cnm8x\" (UniqueName: \"kubernetes.io/projected/0cc7557f-e154-44c0-824e-fe909c4ff8b5-kube-api-access-cnm8x\") pod \"test-pod-1\" (UID: \"0cc7557f-e154-44c0-824e-fe909c4ff8b5\") " pod="default/test-pod-1" Feb 12 22:25:43.255318 kubelet[2108]: I0212 22:25:43.255134 2108 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-00463235-1b41-4e73-8bdf-82ebbb80b75a\" (UniqueName: \"kubernetes.io/nfs/0cc7557f-e154-44c0-824e-fe909c4ff8b5-pvc-00463235-1b41-4e73-8bdf-82ebbb80b75a\") pod \"test-pod-1\" (UID: \"0cc7557f-e154-44c0-824e-fe909c4ff8b5\") " pod="default/test-pod-1" Feb 12 22:25:43.456968 kernel: Failed to create system directory netfs Feb 12 22:25:43.457209 kernel: audit: type=1400 audit(1707776743.441:943): avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.457247 kernel: Failed to create system directory netfs Feb 12 22:25:43.457272 kernel: audit: type=1400 audit(1707776743.441:943): avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.457299 kernel: Failed to create system directory netfs Feb 12 22:25:43.441000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.441000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.465357 kernel: Failed to create system directory netfs Feb 12 22:25:43.465601 kernel: audit: type=1400 audit(1707776743.441:943): avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.441000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.441000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.476588 kernel: audit: type=1400 audit(1707776743.441:943): avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.476680 kernel: audit: type=1300 audit(1707776743.441:943): arch=c000003e syscall=175 success=yes exit=0 a0=559c4579b5e0 a1=153bc a2=559c438272b0 a3=5 items=0 ppid=9 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:43.441000 audit[4238]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559c4579b5e0 a1=153bc a2=559c438272b0 a3=5 items=0 ppid=9 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:43.441000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 22:25:43.481598 kernel: audit: type=1327 audit(1707776743.441:943): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 22:25:43.575920 kernel: Failed to create system directory fscache Feb 12 22:25:43.576388 kernel: audit: type=1400 audit(1707776743.557:944): avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.576672 kernel: Failed to create system directory fscache Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.583926 kernel: audit: type=1400 audit(1707776743.557:944): avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.584068 kernel: Failed to create system directory fscache Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.590144 kernel: audit: type=1400 audit(1707776743.557:944): avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.590327 kernel: Failed to create system directory fscache Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.596296 kernel: audit: type=1400 audit(1707776743.557:944): avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.596436 kernel: Failed to create system directory fscache Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.598434 kernel: Failed to create system directory fscache Feb 12 22:25:43.598510 kernel: Failed to create system directory fscache Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.600626 kernel: Failed to create system directory fscache Feb 12 22:25:43.600675 kernel: Failed to create system directory fscache Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.603019 kernel: Failed to create system directory fscache Feb 12 22:25:43.603092 kernel: Failed to create system directory fscache Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.605380 kernel: Failed to create system directory fscache Feb 12 22:25:43.605418 kernel: Failed to create system directory fscache Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.557000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.607445 kernel: Failed to create system directory fscache Feb 12 22:25:43.557000 audit[4238]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559c459b09c0 a1=4c0fc a2=559c438272b0 a3=5 items=0 ppid=9 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:43.557000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 22:25:43.610053 kernel: FS-Cache: Loaded Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.694319 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.694405 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.695515 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.696684 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.696733 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.698739 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.698791 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.700855 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.700931 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.703179 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.703237 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.705405 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.705454 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.707449 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.707484 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.710589 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.710686 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.711928 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.711984 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.714067 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.714115 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.716206 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.716272 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.718256 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.718302 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.720316 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.720376 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.722460 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.722515 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.725012 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.725099 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.726054 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.727043 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.729115 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.729159 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.731129 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.731171 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.733317 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.733380 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.735332 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.735398 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.737429 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.737471 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.739552 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.739599 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.741768 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.741819 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.743848 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.743976 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.747863 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.747993 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.752003 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.752086 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.754253 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.754327 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.756351 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.756391 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.758334 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.758368 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.761286 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.761386 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.763526 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.763573 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.765508 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.765542 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.767823 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.767953 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.769877 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.769922 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.771949 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.771995 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.774071 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.774197 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.775265 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.777511 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.777564 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.779510 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.779555 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.781898 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.781949 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.782061 kubelet[2108]: E0212 22:25:43.781817 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.784016 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.784071 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.785073 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.786086 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.788376 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.788427 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.792440 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.792512 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.794608 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.794684 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.796132 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.799073 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.799123 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.801800 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.801893 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.804368 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.804417 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.808160 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.808242 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.810219 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.810273 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.813429 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.813480 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.815520 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.815598 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.817999 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.818421 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.820479 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.820556 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.824514 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.824712 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.824746 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.826099 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.829654 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.829706 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.832182 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.832267 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.834770 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.834854 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.837123 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.837192 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.839887 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.839965 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.842615 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.842666 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.676000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.845321 kernel: Failed to create system directory sunrpc Feb 12 22:25:43.859165 kernel: RPC: Registered named UNIX socket transport module. Feb 12 22:25:43.859317 kernel: RPC: Registered udp transport module. Feb 12 22:25:43.859361 kernel: RPC: Registered tcp transport module. Feb 12 22:25:43.860232 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 22:25:43.676000 audit[4238]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559c459fcad0 a1=1588c4 a2=559c438272b0 a3=5 items=6 ppid=9 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:43.676000 audit: CWD cwd="/" Feb 12 22:25:43.676000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:25:43.676000 audit: PATH item=1 name=(null) inode=27007 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:25:43.676000 audit: PATH item=2 name=(null) inode=27007 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:25:43.676000 audit: PATH item=3 name=(null) inode=27008 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:25:43.676000 audit: PATH item=4 name=(null) inode=27007 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:25:43.676000 audit: PATH item=5 name=(null) inode=27009 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:25:43.676000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.914000 kernel: Failed to create system directory nfs Feb 12 22:25:43.914097 kernel: Failed to create system directory nfs Feb 12 22:25:43.914124 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.916433 kernel: Failed to create system directory nfs Feb 12 22:25:43.916504 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.918458 kernel: Failed to create system directory nfs Feb 12 22:25:43.918587 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.921040 kernel: Failed to create system directory nfs Feb 12 22:25:43.921122 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.923194 kernel: Failed to create system directory nfs Feb 12 22:25:43.923270 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.926262 kernel: Failed to create system directory nfs Feb 12 22:25:43.926381 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.929530 kernel: Failed to create system directory nfs Feb 12 22:25:43.929615 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.931982 kernel: Failed to create system directory nfs Feb 12 22:25:43.932052 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.934059 kernel: Failed to create system directory nfs Feb 12 22:25:43.934140 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.936596 kernel: Failed to create system directory nfs Feb 12 22:25:43.936675 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.938796 kernel: Failed to create system directory nfs Feb 12 22:25:43.939032 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.941459 kernel: Failed to create system directory nfs Feb 12 22:25:43.941509 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.944007 kernel: Failed to create system directory nfs Feb 12 22:25:43.944094 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.947073 kernel: Failed to create system directory nfs Feb 12 22:25:43.947124 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.949985 kernel: Failed to create system directory nfs Feb 12 22:25:43.950086 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.952766 kernel: Failed to create system directory nfs Feb 12 22:25:43.953042 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.955101 kernel: Failed to create system directory nfs Feb 12 22:25:43.955145 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.957932 kernel: Failed to create system directory nfs Feb 12 22:25:43.958191 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.960437 kernel: Failed to create system directory nfs Feb 12 22:25:43.960484 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.971260 kernel: Failed to create system directory nfs Feb 12 22:25:43.971836 kernel: Failed to create system directory nfs Feb 12 22:25:43.972956 kernel: Failed to create system directory nfs Feb 12 22:25:43.973001 kernel: Failed to create system directory nfs Feb 12 22:25:43.973038 kernel: Failed to create system directory nfs Feb 12 22:25:43.973076 kernel: Failed to create system directory nfs Feb 12 22:25:43.973100 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.974291 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.974744 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.976064 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.977514 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.979988 kernel: Failed to create system directory nfs Feb 12 22:25:43.980058 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.982604 kernel: Failed to create system directory nfs Feb 12 22:25:43.982674 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.985070 kernel: Failed to create system directory nfs Feb 12 22:25:43.985204 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.988912 kernel: Failed to create system directory nfs Feb 12 22:25:43.989124 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.897000 audit[4238]: AVC avc: denied { confidentiality } for pid=4238 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:43.991411 kernel: Failed to create system directory nfs Feb 12 22:25:43.897000 audit[4238]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559c45b9f680 a1=e29dc a2=559c438272b0 a3=5 items=0 ppid=9 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:44.012873 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 22:25:43.897000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.072763 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.072937 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.073073 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.077765 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.077880 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.081832 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.081936 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.083883 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.083934 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.086922 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.087009 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.089461 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.089514 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.091670 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.091737 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.094272 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.094320 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.096497 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.096559 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.098899 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.098973 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.101989 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.102142 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.105356 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.105433 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.107486 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.107563 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.109436 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.109514 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.111527 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.111600 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.113543 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.113588 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.115638 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.115713 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.117992 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.118196 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.121078 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.121139 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.121164 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.123118 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.123175 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.125097 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.125134 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.127109 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.127152 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.129184 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.129224 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.131147 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.131202 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.133244 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.133292 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.135427 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.135478 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.137777 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.137859 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.139814 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.139855 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.141933 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.142047 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.143118 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.145099 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.145158 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.147277 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.147322 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.149276 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.149356 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.151301 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.151356 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.153557 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.153609 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.155498 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.155538 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.157575 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.157615 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.159573 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.159610 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.161632 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.161696 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.163650 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.163723 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.165688 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.165725 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.167660 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.167698 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.169651 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.169780 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.171699 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.171754 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.173800 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.173857 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.175740 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.175787 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.046000 audit[4243]: AVC avc: denied { confidentiality } for pid=4243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.178070 kernel: Failed to create system directory nfs4 Feb 12 22:25:44.363899 kernel: NFS: Registering the id_resolver key type Feb 12 22:25:44.364100 kernel: Key type id_resolver registered Feb 12 22:25:44.364164 kernel: Key type id_legacy registered Feb 12 22:25:44.046000 audit[4243]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f1e3e05a010 a1=1d3cc4 a2=55b4644bb2b0 a3=5 items=0 ppid=9 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:44.046000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.380111 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.380224 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.380255 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.382178 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.382240 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.384178 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.384231 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.387059 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.387152 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.388878 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.388956 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.390971 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.391062 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.393072 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.393129 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.395081 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.395141 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.397263 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.397320 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.399272 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.399325 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.401301 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.401362 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.403404 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.403443 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.373000 audit[4244]: AVC avc: denied { confidentiality } for pid=4244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 22:25:44.405567 kernel: Failed to create system directory rpcgss Feb 12 22:25:44.373000 audit[4244]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f963c6f2010 a1=4f524 a2=55d6f4ff02b0 a3=5 items=0 ppid=9 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:44.373000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 22:25:44.660777 nfsidmap[4251]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Feb 12 22:25:44.665569 nfsidmap[4252]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Feb 12 22:25:44.678000 audit[1840]: AVC avc: denied { watch_reads } for pid=1840 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2841 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:25:44.678000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a79a962490 a2=10 a3=c95d8b0784e8ee14 items=0 ppid=1 pid=1840 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:44.678000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 22:25:44.678000 audit[1840]: AVC avc: denied { watch_reads } for pid=1840 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2841 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:25:44.678000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a79a962490 a2=10 a3=c95d8b0784e8ee14 items=0 ppid=1 pid=1840 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:44.678000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 22:25:44.678000 audit[1840]: AVC avc: denied { watch_reads } for pid=1840 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2841 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:25:44.678000 audit[1840]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a79a962490 a2=10 a3=c95d8b0784e8ee14 items=0 ppid=1 pid=1840 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:44.678000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 22:25:44.679000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2841 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:25:44.679000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2841 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:25:44.679000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2841 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 22:25:44.722873 env[1647]: time="2024-02-12T22:25:44.722822392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0cc7557f-e154-44c0-824e-fe909c4ff8b5,Namespace:default,Attempt:0,}" Feb 12 22:25:44.782048 kubelet[2108]: E0212 22:25:44.781980 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:44.923798 (udev-worker)[4245]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:25:44.925446 systemd-networkd[1459]: cali5ec59c6bf6e: Link UP Feb 12 22:25:44.930775 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:25:44.930890 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 22:25:44.931570 systemd-networkd[1459]: cali5ec59c6bf6e: Gained carrier Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.835 [INFO][4253] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.23.13-k8s-test--pod--1-eth0 default 0cc7557f-e154-44c0-824e-fe909c4ff8b5 1257 0 2024-02-12 22:25:10 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.23.13 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.23.13-k8s-test--pod--1-" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.835 [INFO][4253] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.23.13-k8s-test--pod--1-eth0" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.876 [INFO][4264] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" HandleID="k8s-pod-network.39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Workload="172.31.23.13-k8s-test--pod--1-eth0" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.889 [INFO][4264] ipam_plugin.go 268: Auto assigning IP ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" HandleID="k8s-pod-network.39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Workload="172.31.23.13-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ae370), Attrs:map[string]string{"namespace":"default", "node":"172.31.23.13", "pod":"test-pod-1", "timestamp":"2024-02-12 22:25:44.876651708 +0000 UTC"}, Hostname:"172.31.23.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.889 [INFO][4264] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.889 [INFO][4264] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.889 [INFO][4264] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.23.13' Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.891 [INFO][4264] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" host="172.31.23.13" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.896 [INFO][4264] ipam.go 372: Looking up existing affinities for host host="172.31.23.13" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.901 [INFO][4264] ipam.go 489: Trying affinity for 192.168.19.192/26 host="172.31.23.13" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.904 [INFO][4264] ipam.go 155: Attempting to load block cidr=192.168.19.192/26 host="172.31.23.13" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.906 [INFO][4264] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.192/26 host="172.31.23.13" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.907 [INFO][4264] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.192/26 handle="k8s-pod-network.39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" host="172.31.23.13" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.908 [INFO][4264] ipam.go 1682: Creating new handle: k8s-pod-network.39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.912 [INFO][4264] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.192/26 handle="k8s-pod-network.39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" host="172.31.23.13" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.917 [INFO][4264] ipam.go 1216: Successfully claimed IPs: [192.168.19.197/26] block=192.168.19.192/26 handle="k8s-pod-network.39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" host="172.31.23.13" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.918 [INFO][4264] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.197/26] handle="k8s-pod-network.39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" host="172.31.23.13" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.918 [INFO][4264] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.918 [INFO][4264] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.197/26] IPv6=[] ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" HandleID="k8s-pod-network.39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Workload="172.31.23.13-k8s-test--pod--1-eth0" Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.920 [INFO][4253] k8s.go 385: Populated endpoint ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.23.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0cc7557f-e154-44c0-824e-fe909c4ff8b5", ResourceVersion:"1257", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 25, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:25:44.952010 env[1647]: 2024-02-12 22:25:44.921 [INFO][4253] k8s.go 386: Calico CNI using IPs: [192.168.19.197/32] ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.23.13-k8s-test--pod--1-eth0" Feb 12 22:25:44.955082 env[1647]: 2024-02-12 22:25:44.921 [INFO][4253] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.23.13-k8s-test--pod--1-eth0" Feb 12 22:25:44.955082 env[1647]: 2024-02-12 22:25:44.932 [INFO][4253] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.23.13-k8s-test--pod--1-eth0" Feb 12 22:25:44.955082 env[1647]: 2024-02-12 22:25:44.933 [INFO][4253] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.23.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.23.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0cc7557f-e154-44c0-824e-fe909c4ff8b5", ResourceVersion:"1257", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 25, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.23.13", ContainerID:"39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"f2:61:9a:ab:6d:cc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:25:44.955082 env[1647]: 2024-02-12 22:25:44.946 [INFO][4253] k8s.go 491: Wrote updated endpoint to datastore ContainerID="39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.23.13-k8s-test--pod--1-eth0" Feb 12 22:25:44.981000 audit[4280]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=4280 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:25:44.981000 audit[4280]: SYSCALL arch=c000003e syscall=46 success=yes exit=19064 a0=3 a1=7ffc9b892bf0 a2=0 a3=7ffc9b892bdc items=0 ppid=3043 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:44.981000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:25:44.997678 env[1647]: time="2024-02-12T22:25:44.997592052Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:25:44.997888 env[1647]: time="2024-02-12T22:25:44.997692550Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:25:44.997888 env[1647]: time="2024-02-12T22:25:44.997777037Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:25:44.998323 env[1647]: time="2024-02-12T22:25:44.998148503Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e pid=4292 runtime=io.containerd.runc.v2 Feb 12 22:25:45.027570 systemd[1]: Started cri-containerd-39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e.scope. Feb 12 22:25:45.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.054000 audit: BPF prog-id=131 op=LOAD Feb 12 22:25:45.055000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.055000 audit[4302]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4292 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:45.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339633963326239666664633638303864383737623336613936346631 Feb 12 22:25:45.055000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.055000 audit[4302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4292 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:45.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339633963326239666664633638303864383737623336613936346631 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit: BPF prog-id=132 op=LOAD Feb 12 22:25:45.056000 audit[4302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00029b450 items=0 ppid=4292 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:45.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339633963326239666664633638303864383737623336613936346631 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.056000 audit: BPF prog-id=133 op=LOAD Feb 12 22:25:45.056000 audit[4302]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00029b498 items=0 ppid=4292 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:45.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339633963326239666664633638303864383737623336613936346631 Feb 12 22:25:45.057000 audit: BPF prog-id=133 op=UNLOAD Feb 12 22:25:45.057000 audit: BPF prog-id=132 op=UNLOAD Feb 12 22:25:45.057000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.057000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.057000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.057000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.057000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.057000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.057000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.057000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.057000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.057000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.057000 audit: BPF prog-id=134 op=LOAD Feb 12 22:25:45.057000 audit[4302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00029b8a8 items=0 ppid=4292 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:45.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339633963326239666664633638303864383737623336613936346631 Feb 12 22:25:45.122291 env[1647]: time="2024-02-12T22:25:45.121827708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0cc7557f-e154-44c0-824e-fe909c4ff8b5,Namespace:default,Attempt:0,} returns sandbox id \"39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e\"" Feb 12 22:25:45.125374 env[1647]: time="2024-02-12T22:25:45.124186814Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 22:25:45.529148 env[1647]: time="2024-02-12T22:25:45.529100342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:45.533466 env[1647]: time="2024-02-12T22:25:45.533418703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:45.537040 env[1647]: time="2024-02-12T22:25:45.536979909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:45.540583 env[1647]: time="2024-02-12T22:25:45.540336312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:45.542659 env[1647]: time="2024-02-12T22:25:45.542614831Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 22:25:45.545589 env[1647]: time="2024-02-12T22:25:45.545553931Z" level=info msg="CreateContainer within sandbox \"39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 22:25:45.569536 env[1647]: time="2024-02-12T22:25:45.569478227Z" level=info msg="CreateContainer within sandbox \"39c9c2b9ffdc6808d877b36a964f1a9afd7f466aab2269bcb60edc0e45b66d9e\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"3d43f0dc63555b8508c11cd45abae3c7c22ff512ae00f1d64ad91a6c2c507a77\"" Feb 12 22:25:45.572685 env[1647]: time="2024-02-12T22:25:45.572637862Z" level=info msg="StartContainer for \"3d43f0dc63555b8508c11cd45abae3c7c22ff512ae00f1d64ad91a6c2c507a77\"" Feb 12 22:25:45.600191 systemd[1]: Started cri-containerd-3d43f0dc63555b8508c11cd45abae3c7c22ff512ae00f1d64ad91a6c2c507a77.scope. Feb 12 22:25:45.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.619000 audit: BPF prog-id=135 op=LOAD Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4292 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:45.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364343366306463363335353562383530386331316364343561626165 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4292 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:45.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364343366306463363335353562383530386331316364343561626165 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit: BPF prog-id=136 op=LOAD Feb 12 22:25:45.620000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000193250 items=0 ppid=4292 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:45.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364343366306463363335353562383530386331316364343561626165 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit: BPF prog-id=137 op=LOAD Feb 12 22:25:45.620000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000193298 items=0 ppid=4292 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:45.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364343366306463363335353562383530386331316364343561626165 Feb 12 22:25:45.620000 audit: BPF prog-id=137 op=UNLOAD Feb 12 22:25:45.620000 audit: BPF prog-id=136 op=UNLOAD Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:45.620000 audit: BPF prog-id=138 op=LOAD Feb 12 22:25:45.620000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001936a8 items=0 ppid=4292 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:45.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364343366306463363335353562383530386331316364343561626165 Feb 12 22:25:45.723111 env[1647]: time="2024-02-12T22:25:45.722984928Z" level=info msg="StartContainer for \"3d43f0dc63555b8508c11cd45abae3c7c22ff512ae00f1d64ad91a6c2c507a77\" returns successfully" Feb 12 22:25:45.782273 kubelet[2108]: E0212 22:25:45.782141 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:46.782868 kubelet[2108]: E0212 22:25:46.782833 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:46.910256 systemd-networkd[1459]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 22:25:47.783233 kubelet[2108]: E0212 22:25:47.783189 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:48.783468 kubelet[2108]: E0212 22:25:48.783416 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:49.784006 kubelet[2108]: E0212 22:25:49.783951 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:50.784886 kubelet[2108]: E0212 22:25:50.784836 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:51.784943 kubelet[2108]: E0212 22:25:51.784905 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:52.785972 kubelet[2108]: E0212 22:25:52.785917 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:53.786638 kubelet[2108]: E0212 22:25:53.786597 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:54.787333 kubelet[2108]: E0212 22:25:54.787279 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:54.817872 systemd[1]: run-containerd-runc-k8s.io-a941731937d31cda0ed7da1693f7e6b93a32e38a71fb17b6222c79b14d8654db-runc.Dy5xrj.mount: Deactivated successfully. Feb 12 22:25:55.787495 kubelet[2108]: E0212 22:25:55.787441 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:56.788335 kubelet[2108]: E0212 22:25:56.788287 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:57.789110 kubelet[2108]: E0212 22:25:57.788985 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:58.698016 kubelet[2108]: E0212 22:25:58.697971 2108 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:58.790220 kubelet[2108]: E0212 22:25:58.790175 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:25:59.791119 kubelet[2108]: E0212 22:25:59.791080 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:00.792017 kubelet[2108]: E0212 22:26:00.791960 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:01.792404 kubelet[2108]: E0212 22:26:01.792355 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:02.793286 kubelet[2108]: E0212 22:26:02.793221 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:03.793426 kubelet[2108]: E0212 22:26:03.793383 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:04.793790 kubelet[2108]: E0212 22:26:04.793737 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:05.794764 kubelet[2108]: E0212 22:26:05.794723 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:06.662000 audit[3851]: AVC avc: denied { watch } for pid=3851 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_25_00.1686205141/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c666 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c329,c666 tclass=file permissive=0 Feb 12 22:26:06.664686 kernel: kauditd_printk_skb: 461 callbacks suppressed Feb 12 22:26:06.664760 kernel: audit: type=1400 audit(1707776766.662:992): avc: denied { watch } for pid=3851 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_25_00.1686205141/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c666 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c329,c666 tclass=file permissive=0 Feb 12 22:26:06.662000 audit[3851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019ebd20 a2=fc6 a3=0 items=0 ppid=3788 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c666 key=(null) Feb 12 22:26:06.681614 kernel: audit: type=1300 audit(1707776766.662:992): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019ebd20 a2=fc6 a3=0 items=0 ppid=3788 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c666 key=(null) Feb 12 22:26:06.681787 kernel: audit: type=1327 audit(1707776766.662:992): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:26:06.662000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:26:06.795953 kubelet[2108]: E0212 22:26:06.795906 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:07.796775 kubelet[2108]: E0212 22:26:07.796722 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:08.797163 kubelet[2108]: E0212 22:26:08.797114 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:09.798306 kubelet[2108]: E0212 22:26:09.798240 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:10.798482 kubelet[2108]: E0212 22:26:10.798437 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:11.798799 kubelet[2108]: E0212 22:26:11.798719 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:12.799801 kubelet[2108]: E0212 22:26:12.799749 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:13.354779 kubelet[2108]: E0212 22:26:13.354717 2108 controller.go:189] failed to update lease, error: Put "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.23.13?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 12 22:26:13.800260 kubelet[2108]: E0212 22:26:13.800216 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:14.801350 kubelet[2108]: E0212 22:26:14.801308 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:15.802885 kubelet[2108]: E0212 22:26:15.802834 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:16.803461 kubelet[2108]: E0212 22:26:16.803406 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:17.804535 kubelet[2108]: E0212 22:26:17.804404 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:18.698212 kubelet[2108]: E0212 22:26:18.698163 2108 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:18.804840 kubelet[2108]: E0212 22:26:18.804789 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:19.805339 kubelet[2108]: E0212 22:26:19.805285 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:20.806113 kubelet[2108]: E0212 22:26:20.806061 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:21.808331 kubelet[2108]: E0212 22:26:21.808071 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:22.808456 kubelet[2108]: E0212 22:26:22.808403 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:23.355554 kubelet[2108]: E0212 22:26:23.355505 2108 controller.go:189] failed to update lease, error: Put "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.23.13?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 12 22:26:23.809568 kubelet[2108]: E0212 22:26:23.809520 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:24.810394 kubelet[2108]: E0212 22:26:24.810354 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:24.824168 systemd[1]: run-containerd-runc-k8s.io-a941731937d31cda0ed7da1693f7e6b93a32e38a71fb17b6222c79b14d8654db-runc.AEkbZK.mount: Deactivated successfully. Feb 12 22:26:25.810997 kubelet[2108]: E0212 22:26:25.810940 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:26.811420 kubelet[2108]: E0212 22:26:26.811381 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:27.812583 kubelet[2108]: E0212 22:26:27.812529 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:28.812749 kubelet[2108]: E0212 22:26:28.812698 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:29.813126 kubelet[2108]: E0212 22:26:29.813070 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:30.257689 systemd[1]: run-containerd-runc-k8s.io-624f00ccb7294deb21cb3b937b1fadc042b9b220709f113771e70e75d973053a-runc.WD1Zm4.mount: Deactivated successfully. Feb 12 22:26:30.814039 kubelet[2108]: E0212 22:26:30.813986 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:31.814398 kubelet[2108]: E0212 22:26:31.814340 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:32.814641 kubelet[2108]: E0212 22:26:32.814545 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:33.356119 kubelet[2108]: E0212 22:26:33.356086 2108 controller.go:189] failed to update lease, error: Put "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.23.13?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 12 22:26:33.381945 kubelet[2108]: E0212 22:26:33.381072 2108 controller.go:189] failed to update lease, error: Put "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.23.13?timeout=10s": unexpected EOF Feb 12 22:26:33.381945 kubelet[2108]: E0212 22:26:33.381701 2108 controller.go:189] failed to update lease, error: Put "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.23.13?timeout=10s": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:26:33.381945 kubelet[2108]: I0212 22:26:33.381744 2108 controller.go:116] failed to update lease using latest lease, fallback to ensure lease, err: failed 5 attempts to update lease Feb 12 22:26:33.382477 kubelet[2108]: E0212 22:26:33.382445 2108 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.23.13?timeout=10s": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:26:33.584118 kubelet[2108]: E0212 22:26:33.583986 2108 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.23.13?timeout=10s": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:26:33.815823 kubelet[2108]: E0212 22:26:33.815725 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:33.986046 kubelet[2108]: E0212 22:26:33.985992 2108 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.23.13?timeout=10s": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:26:34.817104 kubelet[2108]: E0212 22:26:34.817054 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 22:26:35.817462 kubelet[2108]: E0212 22:26:35.817403 2108 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"